CVE-2026-26742: n/a
PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism failure in the "Re-arm Grace Period" logic. The system incorrectly applies the in-air emergency re-arm logic to ground scenarios. If a pilot switches to Manual mode and re-arms within 5 seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This allows for an immediate high-thrust takeoff if the throttle stick is raised, leading to loss of control.
AI Analysis
Technical Summary
CVE-2026-26742 identifies a critical vulnerability in the PX4 Autopilot software versions 1.12.x through 1.15.x, specifically within the "Re-arm Grace Period" logic. PX4 is an open-source flight control software widely used in drones and UAVs for various applications including commercial delivery, agriculture, inspection, and defense. The vulnerability arises because the system incorrectly applies the in-air emergency re-arm logic to ground scenarios. Normally, after an automatic landing, the autopilot enforces safety checks before allowing a re-arm to prevent unintended takeoff. However, if a pilot switches to Manual mode and re-arms within the default 5-second grace period after landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This means that if the throttle stick is raised immediately after re-arming, the drone can perform an immediate high-thrust takeoff without the usual safeguards. This flaw can lead to sudden, uncontrolled drone behavior, increasing the risk of crashes, damage to property, or injury to people nearby. The vulnerability does not require authentication or complex user interaction beyond normal pilot operations, making it easier to trigger unintentionally or maliciously. No CVSS score has been assigned yet, and no public exploits are known at this time. The root cause is a logic error in the state machine handling re-arm conditions, which should be corrected by updating the autopilot software to properly distinguish between in-air and ground re-arm scenarios and enforce all safety checks consistently.
Potential Impact
The impact of CVE-2026-26742 is significant for organizations relying on PX4 Autopilot for UAV operations. The vulnerability can cause immediate loss of control during critical flight phases, such as right after landing, by allowing a high-thrust takeoff without safety checks. This can result in drone crashes, damage to expensive equipment, injury to personnel, and potential collateral damage to infrastructure or bystanders. For commercial operators, this could lead to operational downtime, financial losses, and reputational damage. In industrial or agricultural contexts, it may disrupt automated workflows and data collection. Defense and security organizations using PX4-based drones could face mission failures or unintended engagements. The lack of authentication or complex exploitation requirements means that even authorized pilots can inadvertently trigger the vulnerability, increasing the risk of accidents. Although no known exploits are reported, the vulnerability's nature makes it a critical safety concern that must be addressed promptly to prevent incidents.
Mitigation Recommendations
To mitigate CVE-2026-26742, organizations should: 1) Immediately update PX4 Autopilot software to the latest patched version once available that corrects the re-arm grace period logic. 2) Implement additional software-level safeguards that enforce all pre-flight safety checks regardless of mode switches or timing after landing. 3) Introduce operational procedures requiring pilots to wait beyond the 5-second grace period before re-arming or switching modes post-landing. 4) Conduct thorough training for UAV operators to recognize and avoid conditions that could trigger this vulnerability. 5) Employ telemetry monitoring to detect abnormal throttle inputs or re-arm sequences and trigger automated safety overrides. 6) For critical operations, consider hardware interlocks or redundant safety mechanisms that prevent immediate high-thrust takeoff without explicit confirmation. 7) Engage with PX4 community and vendors to track patches and advisories. 8) Perform regular security audits and flight simulations to validate that safety checks cannot be bypassed. These measures combined will reduce the risk of exploitation and enhance overall UAV operational safety.
Affected Countries
United States, China, Germany, France, United Kingdom, Japan, South Korea, Australia, Canada, India, Israel, United Arab Emirates
CVE-2026-26742: n/a
Description
PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism failure in the "Re-arm Grace Period" logic. The system incorrectly applies the in-air emergency re-arm logic to ground scenarios. If a pilot switches to Manual mode and re-arms within 5 seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This allows for an immediate high-thrust takeoff if the throttle stick is raised, leading to loss of control.
AI-Powered Analysis
Technical Analysis
CVE-2026-26742 identifies a critical vulnerability in the PX4 Autopilot software versions 1.12.x through 1.15.x, specifically within the "Re-arm Grace Period" logic. PX4 is an open-source flight control software widely used in drones and UAVs for various applications including commercial delivery, agriculture, inspection, and defense. The vulnerability arises because the system incorrectly applies the in-air emergency re-arm logic to ground scenarios. Normally, after an automatic landing, the autopilot enforces safety checks before allowing a re-arm to prevent unintended takeoff. However, if a pilot switches to Manual mode and re-arms within the default 5-second grace period after landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This means that if the throttle stick is raised immediately after re-arming, the drone can perform an immediate high-thrust takeoff without the usual safeguards. This flaw can lead to sudden, uncontrolled drone behavior, increasing the risk of crashes, damage to property, or injury to people nearby. The vulnerability does not require authentication or complex user interaction beyond normal pilot operations, making it easier to trigger unintentionally or maliciously. No CVSS score has been assigned yet, and no public exploits are known at this time. The root cause is a logic error in the state machine handling re-arm conditions, which should be corrected by updating the autopilot software to properly distinguish between in-air and ground re-arm scenarios and enforce all safety checks consistently.
Potential Impact
The impact of CVE-2026-26742 is significant for organizations relying on PX4 Autopilot for UAV operations. The vulnerability can cause immediate loss of control during critical flight phases, such as right after landing, by allowing a high-thrust takeoff without safety checks. This can result in drone crashes, damage to expensive equipment, injury to personnel, and potential collateral damage to infrastructure or bystanders. For commercial operators, this could lead to operational downtime, financial losses, and reputational damage. In industrial or agricultural contexts, it may disrupt automated workflows and data collection. Defense and security organizations using PX4-based drones could face mission failures or unintended engagements. The lack of authentication or complex exploitation requirements means that even authorized pilots can inadvertently trigger the vulnerability, increasing the risk of accidents. Although no known exploits are reported, the vulnerability's nature makes it a critical safety concern that must be addressed promptly to prevent incidents.
Mitigation Recommendations
To mitigate CVE-2026-26742, organizations should: 1) Immediately update PX4 Autopilot software to the latest patched version once available that corrects the re-arm grace period logic. 2) Implement additional software-level safeguards that enforce all pre-flight safety checks regardless of mode switches or timing after landing. 3) Introduce operational procedures requiring pilots to wait beyond the 5-second grace period before re-arming or switching modes post-landing. 4) Conduct thorough training for UAV operators to recognize and avoid conditions that could trigger this vulnerability. 5) Employ telemetry monitoring to detect abnormal throttle inputs or re-arm sequences and trigger automated safety overrides. 6) For critical operations, consider hardware interlocks or redundant safety mechanisms that prevent immediate high-thrust takeoff without explicit confirmation. 7) Engage with PX4 community and vendors to track patches and advisories. 8) Perform regular security audits and flight simulations to validate that safety checks cannot be bypassed. These measures combined will reduce the risk of exploitation and enhance overall UAV operational safety.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-02-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69b06a2a2f860ef943991ead
Added to database: 3/10/2026, 6:59:54 PM
Last enriched: 3/10/2026, 7:17:40 PM
Last updated: 3/13/2026, 11:12:51 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.