Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26742: n/a

0
High
VulnerabilityCVE-2026-26742cvecve-2026-26742
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism failure in the "Re-arm Grace Period" logic. The system incorrectly applies the in-air emergency re-arm logic to ground scenarios. If a pilot switches to Manual mode and re-arms within 5 seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This allows for an immediate high-thrust takeoff if the throttle stick is raised, leading to loss of control.

AI-Powered Analysis

AILast updated: 03/10/2026, 19:17:40 UTC

Technical Analysis

CVE-2026-26742 identifies a critical vulnerability in the PX4 Autopilot software versions 1.12.x through 1.15.x, specifically within the "Re-arm Grace Period" logic. PX4 is an open-source flight control software widely used in drones and UAVs for various applications including commercial delivery, agriculture, inspection, and defense. The vulnerability arises because the system incorrectly applies the in-air emergency re-arm logic to ground scenarios. Normally, after an automatic landing, the autopilot enforces safety checks before allowing a re-arm to prevent unintended takeoff. However, if a pilot switches to Manual mode and re-arms within the default 5-second grace period after landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This means that if the throttle stick is raised immediately after re-arming, the drone can perform an immediate high-thrust takeoff without the usual safeguards. This flaw can lead to sudden, uncontrolled drone behavior, increasing the risk of crashes, damage to property, or injury to people nearby. The vulnerability does not require authentication or complex user interaction beyond normal pilot operations, making it easier to trigger unintentionally or maliciously. No CVSS score has been assigned yet, and no public exploits are known at this time. The root cause is a logic error in the state machine handling re-arm conditions, which should be corrected by updating the autopilot software to properly distinguish between in-air and ground re-arm scenarios and enforce all safety checks consistently.

Potential Impact

The impact of CVE-2026-26742 is significant for organizations relying on PX4 Autopilot for UAV operations. The vulnerability can cause immediate loss of control during critical flight phases, such as right after landing, by allowing a high-thrust takeoff without safety checks. This can result in drone crashes, damage to expensive equipment, injury to personnel, and potential collateral damage to infrastructure or bystanders. For commercial operators, this could lead to operational downtime, financial losses, and reputational damage. In industrial or agricultural contexts, it may disrupt automated workflows and data collection. Defense and security organizations using PX4-based drones could face mission failures or unintended engagements. The lack of authentication or complex exploitation requirements means that even authorized pilots can inadvertently trigger the vulnerability, increasing the risk of accidents. Although no known exploits are reported, the vulnerability's nature makes it a critical safety concern that must be addressed promptly to prevent incidents.

Mitigation Recommendations

To mitigate CVE-2026-26742, organizations should: 1) Immediately update PX4 Autopilot software to the latest patched version once available that corrects the re-arm grace period logic. 2) Implement additional software-level safeguards that enforce all pre-flight safety checks regardless of mode switches or timing after landing. 3) Introduce operational procedures requiring pilots to wait beyond the 5-second grace period before re-arming or switching modes post-landing. 4) Conduct thorough training for UAV operators to recognize and avoid conditions that could trigger this vulnerability. 5) Employ telemetry monitoring to detect abnormal throttle inputs or re-arm sequences and trigger automated safety overrides. 6) For critical operations, consider hardware interlocks or redundant safety mechanisms that prevent immediate high-thrust takeoff without explicit confirmation. 7) Engage with PX4 community and vendors to track patches and advisories. 8) Perform regular security audits and flight simulations to validate that safety checks cannot be bypassed. These measures combined will reduce the risk of exploitation and enhance overall UAV operational safety.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b06a2a2f860ef943991ead

Added to database: 3/10/2026, 6:59:54 PM

Last enriched: 3/10/2026, 7:17:40 PM

Last updated: 3/13/2026, 11:12:51 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses