Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot

0
High
VulnerabilityCVE-2026-32706cvecve-2026-32706cwe-120cwe-787
Published: Fri Mar 13 2026 (03/13/2026, 21:17:02 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32706 is a high-severity buffer overflow vulnerability in the PX4-Autopilot flight control software for drones, affecting versions prior to 1. 17. 0-rc2. The vulnerability arises from the crsf_rc parser accepting an oversized variable-length packet and copying it into a fixed 64-byte buffer without proper bounds checking. This flaw allows an attacker with access to the CRSF serial port to cause memory corruption and crash the autopilot system. Exploitation requires no authentication or user interaction but does require adjacency or raw serial access to the CRSF interface. The vulnerability impacts the integrity and availability of the drone's flight control, potentially leading to denial of service or unsafe drone behavior. The issue is fixed in version 1. 17. 0-rc2.

AI-Powered Analysis

AILast updated: 03/13/2026, 21:44:07 UTC

Technical Analysis

CVE-2026-32706 is a classic buffer overflow vulnerability (CWE-120) identified in the PX4-Autopilot software, a widely used open-source flight control solution for drones. The vulnerability exists in the crsf_rc parser component, which processes packets received over the CRSF serial port. Specifically, the parser accepts variable-length known packets but fails to verify that the packet size does not exceed the fixed 64-byte global buffer allocated for storage. When an oversized packet is received, it is copied into this buffer without bounds checking, resulting in memory corruption. This can lead to a crash of the PX4 system, affecting the drone's flight control software's availability and potentially its integrity. The attack vector requires an attacker to have access to the CRSF serial port, which is typically a local or adjacent interface, implying physical or network proximity. No privileges or user interaction are required to exploit this vulnerability. The flaw was addressed and fixed in PX4 version 1.17.0-rc2. The CVSS v3.1 score of 7.1 reflects the high severity due to the ease of exploitation and significant impact on availability and integrity, though confidentiality is not affected. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of insufficient input validation in embedded systems controlling critical drone functions.

Potential Impact

The primary impact of CVE-2026-32706 is on the availability and integrity of drone flight control systems using PX4-Autopilot versions prior to 1.17.0-rc2. Successful exploitation can cause memory corruption leading to system crashes, resulting in denial of service of the autopilot. This can cause drones to lose control, potentially leading to unsafe flight conditions, crashes, or mission failures. For organizations relying on PX4-based drones for commercial, industrial, or governmental operations, this can translate into operational disruptions, safety hazards, financial losses, and reputational damage. Since the vulnerability requires access to the CRSF serial port, attackers with physical proximity or network access to the drone's control interface pose the greatest risk. The lack of confidentiality impact limits data leakage concerns, but the integrity and availability risks are significant, especially in safety-critical drone deployments such as delivery, surveillance, or infrastructure inspection.

Mitigation Recommendations

To mitigate CVE-2026-32706, organizations should immediately upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. In addition, strict access controls should be enforced on the CRSF serial port to prevent unauthorized or adjacent attackers from sending malicious packets. This includes physical security measures to restrict direct hardware access and network segmentation to isolate drone control interfaces from untrusted networks. Implementing monitoring and anomaly detection on serial port traffic can help identify attempts to exploit the vulnerability. Developers should also review and apply secure coding practices, including rigorous input validation and bounds checking, to prevent similar buffer overflow issues. For deployments where immediate upgrade is not feasible, disabling the crsf_rc parser or the CRSF serial port if not in use can reduce exposure. Finally, conducting regular security assessments and firmware audits on drone systems will help identify and remediate vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.823Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b481d42f860ef943b5ebc6

Added to database: 3/13/2026, 9:29:56 PM

Last enriched: 3/13/2026, 9:44:07 PM

Last updated: 3/14/2026, 2:54:31 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses