CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot
CVE-2026-32706 is a high-severity buffer overflow vulnerability in the PX4-Autopilot flight control software for drones, affecting versions prior to 1. 17. 0-rc2. The vulnerability arises from the crsf_rc parser accepting an oversized variable-length packet and copying it into a fixed 64-byte buffer without proper bounds checking. This flaw allows an attacker with access to the CRSF serial port to cause memory corruption and crash the autopilot system. Exploitation requires no authentication or user interaction but does require adjacency or raw serial access to the CRSF interface. The vulnerability impacts the integrity and availability of the drone's flight control, potentially leading to denial of service or unsafe drone behavior. The issue is fixed in version 1. 17. 0-rc2.
AI Analysis
Technical Summary
CVE-2026-32706 is a classic buffer overflow vulnerability (CWE-120) identified in the PX4-Autopilot software, a widely used open-source flight control solution for drones. The vulnerability exists in the crsf_rc parser component, which processes packets received over the CRSF serial port. Specifically, the parser accepts variable-length known packets but fails to verify that the packet size does not exceed the fixed 64-byte global buffer allocated for storage. When an oversized packet is received, it is copied into this buffer without bounds checking, resulting in memory corruption. This can lead to a crash of the PX4 system, affecting the drone's flight control software's availability and potentially its integrity. The attack vector requires an attacker to have access to the CRSF serial port, which is typically a local or adjacent interface, implying physical or network proximity. No privileges or user interaction are required to exploit this vulnerability. The flaw was addressed and fixed in PX4 version 1.17.0-rc2. The CVSS v3.1 score of 7.1 reflects the high severity due to the ease of exploitation and significant impact on availability and integrity, though confidentiality is not affected. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of insufficient input validation in embedded systems controlling critical drone functions.
Potential Impact
The primary impact of CVE-2026-32706 is on the availability and integrity of drone flight control systems using PX4-Autopilot versions prior to 1.17.0-rc2. Successful exploitation can cause memory corruption leading to system crashes, resulting in denial of service of the autopilot. This can cause drones to lose control, potentially leading to unsafe flight conditions, crashes, or mission failures. For organizations relying on PX4-based drones for commercial, industrial, or governmental operations, this can translate into operational disruptions, safety hazards, financial losses, and reputational damage. Since the vulnerability requires access to the CRSF serial port, attackers with physical proximity or network access to the drone's control interface pose the greatest risk. The lack of confidentiality impact limits data leakage concerns, but the integrity and availability risks are significant, especially in safety-critical drone deployments such as delivery, surveillance, or infrastructure inspection.
Mitigation Recommendations
To mitigate CVE-2026-32706, organizations should immediately upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. In addition, strict access controls should be enforced on the CRSF serial port to prevent unauthorized or adjacent attackers from sending malicious packets. This includes physical security measures to restrict direct hardware access and network segmentation to isolate drone control interfaces from untrusted networks. Implementing monitoring and anomaly detection on serial port traffic can help identify attempts to exploit the vulnerability. Developers should also review and apply secure coding practices, including rigorous input validation and bounds checking, to prevent similar buffer overflow issues. For deployments where immediate upgrade is not feasible, disabling the crsf_rc parser or the CRSF serial port if not in use can reduce exposure. Finally, conducting regular security assessments and firmware audits on drone systems will help identify and remediate vulnerabilities proactively.
Affected Countries
United States, China, Germany, France, Japan, South Korea, United Kingdom, Canada, Australia, Israel
CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot
Description
CVE-2026-32706 is a high-severity buffer overflow vulnerability in the PX4-Autopilot flight control software for drones, affecting versions prior to 1. 17. 0-rc2. The vulnerability arises from the crsf_rc parser accepting an oversized variable-length packet and copying it into a fixed 64-byte buffer without proper bounds checking. This flaw allows an attacker with access to the CRSF serial port to cause memory corruption and crash the autopilot system. Exploitation requires no authentication or user interaction but does require adjacency or raw serial access to the CRSF interface. The vulnerability impacts the integrity and availability of the drone's flight control, potentially leading to denial of service or unsafe drone behavior. The issue is fixed in version 1. 17. 0-rc2.
AI-Powered Analysis
Technical Analysis
CVE-2026-32706 is a classic buffer overflow vulnerability (CWE-120) identified in the PX4-Autopilot software, a widely used open-source flight control solution for drones. The vulnerability exists in the crsf_rc parser component, which processes packets received over the CRSF serial port. Specifically, the parser accepts variable-length known packets but fails to verify that the packet size does not exceed the fixed 64-byte global buffer allocated for storage. When an oversized packet is received, it is copied into this buffer without bounds checking, resulting in memory corruption. This can lead to a crash of the PX4 system, affecting the drone's flight control software's availability and potentially its integrity. The attack vector requires an attacker to have access to the CRSF serial port, which is typically a local or adjacent interface, implying physical or network proximity. No privileges or user interaction are required to exploit this vulnerability. The flaw was addressed and fixed in PX4 version 1.17.0-rc2. The CVSS v3.1 score of 7.1 reflects the high severity due to the ease of exploitation and significant impact on availability and integrity, though confidentiality is not affected. No known exploits are reported in the wild as of the publication date. This vulnerability highlights the risks of insufficient input validation in embedded systems controlling critical drone functions.
Potential Impact
The primary impact of CVE-2026-32706 is on the availability and integrity of drone flight control systems using PX4-Autopilot versions prior to 1.17.0-rc2. Successful exploitation can cause memory corruption leading to system crashes, resulting in denial of service of the autopilot. This can cause drones to lose control, potentially leading to unsafe flight conditions, crashes, or mission failures. For organizations relying on PX4-based drones for commercial, industrial, or governmental operations, this can translate into operational disruptions, safety hazards, financial losses, and reputational damage. Since the vulnerability requires access to the CRSF serial port, attackers with physical proximity or network access to the drone's control interface pose the greatest risk. The lack of confidentiality impact limits data leakage concerns, but the integrity and availability risks are significant, especially in safety-critical drone deployments such as delivery, surveillance, or infrastructure inspection.
Mitigation Recommendations
To mitigate CVE-2026-32706, organizations should immediately upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. In addition, strict access controls should be enforced on the CRSF serial port to prevent unauthorized or adjacent attackers from sending malicious packets. This includes physical security measures to restrict direct hardware access and network segmentation to isolate drone control interfaces from untrusted networks. Implementing monitoring and anomaly detection on serial port traffic can help identify attempts to exploit the vulnerability. Developers should also review and apply secure coding practices, including rigorous input validation and bounds checking, to prevent similar buffer overflow issues. For deployments where immediate upgrade is not feasible, disabling the crsf_rc parser or the CRSF serial port if not in use can reduce exposure. Finally, conducting regular security assessments and firmware audits on drone systems will help identify and remediate vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T14:33:42.823Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b481d42f860ef943b5ebc6
Added to database: 3/13/2026, 9:29:56 PM
Last enriched: 3/13/2026, 9:44:07 PM
Last updated: 3/14/2026, 2:54:31 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.