Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26011: CWE-787: Out-of-bounds Write in ros-navigation navigation2

0
Critical
VulnerabilityCVE-2026-26011cvecve-2026-26011cwe-787cwe-122
Published: Thu Feb 12 2026 (02/12/2026, 20:42:50 UTC)
Source: CVE Database V5
Vendor/Project: ros-navigation
Product: navigation2

Description

CVE-2026-26011 is a critical heap out-of-bounds write vulnerability in the ROS 2 Navigation Framework's navigation2 package, specifically in the AMCL particle filter clustering logic. An unauthenticated attacker on the same ROS 2 DDS domain can exploit this by sending a crafted PoseWithCovarianceStamped message with extreme covariance values to the /initialpose topic. This triggers a negative index write into heap memory, corrupting heap chunk metadata and potentially enabling further exploitation. The vulnerability exists in versions 1. 3. 11 and earlier, with no runtime boundary checks in release builds. Exploitation requires no authentication or user interaction and can cause reliable denial of service by halting localization and navigation. The CVSS 4. 0 score is 9. 3, indicating critical severity.

AI-Powered Analysis

AILast updated: 02/20/2026, 09:04:11 UTC

Technical Analysis

CVE-2026-26011 is a critical heap out-of-bounds write vulnerability identified in the navigation2 package of the ROS 2 Navigation Framework, affecting versions up to and including 1.3.11. The flaw resides in the Adaptive Monte Carlo Localization (AMCL) particle filter clustering logic, where processing a specially crafted geometry_msgs/PoseWithCovarianceStamped message with extreme covariance values sent to the /initialpose topic leads to a negative index write (set->clusters[-1]) into heap memory preceding the allocated buffer. This vulnerability arises because the only boundary check is an assert statement, which is removed in release builds, leaving no runtime protection. The heap corruption allows an attacker to manipulate heap chunk metadata, including the size of the heap chunk, which can be leveraged for further exploitation such as arbitrary code execution or system destabilization. The attack vector requires the attacker to be on the same ROS 2 DDS domain but does not require authentication or user interaction, making it highly accessible within compromised or exposed ROS 2 environments. The vulnerability can cause a reliable denial of service by disrupting localization and halting navigation functions, critical for robotic systems relying on navigation2. The CVSS 4.0 base score of 9.3 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation and lack of required privileges. No patches were linked at the time of publication, and no known exploits have been reported in the wild, but the risk remains significant due to the critical nature of the flaw and the growing adoption of ROS 2 in robotics and autonomous systems.

Potential Impact

The impact of CVE-2026-26011 is substantial for organizations deploying ROS 2 navigation2 in robotics, autonomous vehicles, industrial automation, and research environments. Exploitation can lead to immediate denial of service by crashing or halting navigation and localization processes, which are essential for robot operation and safety. This can cause operational downtime, safety hazards, and mission failures in critical systems such as autonomous delivery robots, drones, or manufacturing robots. Beyond denial of service, the heap corruption may enable attackers to execute arbitrary code or escalate privileges within the ROS 2 environment, potentially compromising the entire robotic system and connected infrastructure. Given that ROS 2 is often used in safety-critical and industrial contexts, the vulnerability poses risks to physical safety, operational continuity, and intellectual property. The unauthenticated nature of the attack and lack of user interaction requirements increase the likelihood of exploitation in environments where ROS 2 DDS domains are accessible or insufficiently segmented. Organizations may face reputational damage, regulatory consequences, and financial losses if exploited in production systems.

Mitigation Recommendations

To mitigate CVE-2026-26011, organizations should immediately upgrade navigation2 to a patched version once available, as no patches were linked at the time of disclosure. Until patches are released, implement strict network segmentation and access controls to restrict ROS 2 DDS domain access only to trusted and authenticated nodes, minimizing exposure to unauthenticated attackers. Employ ROS 2 security features such as DDS Security plugins to enforce authentication, encryption, and access control policies. Monitor ROS 2 topics, especially /initialpose, for anomalous or malformed messages with extreme covariance values using custom validation or intrusion detection systems tailored for ROS 2 message traffic. Consider deploying runtime memory protection tools and heap integrity checkers to detect and prevent heap corruption attempts. Conduct thorough code audits and fuzz testing on navigation2 components to identify and remediate similar vulnerabilities proactively. Finally, establish incident response plans specific to robotic system compromises to quickly isolate and recover affected systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.553Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e404cc9e1ff5ad81500de

Added to database: 2/12/2026, 9:04:12 PM

Last enriched: 2/20/2026, 9:04:11 AM

Last updated: 3/12/2026, 5:44:25 AM

Views: 244

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses