CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2.
AI Analysis
Technical Summary
CVE-2026-32706 is a classic buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control system for drones. The vulnerability exists in the crsf_rc parser component, which handles packets received over the CRSF serial protocol. Specifically, prior to version 1.17.0-rc2, the parser accepts variable-length known packets but copies them into a fixed-size global buffer of 64 bytes without verifying that the input size fits within this buffer. This lack of bounds checking leads to a buffer overflow condition when an oversized packet is processed. An attacker with access to the CRSF serial port—typically requiring adjacency or direct serial access—can send a maliciously crafted packet that triggers memory corruption. This corruption can cause the PX4 autopilot software to crash, resulting in denial of service and potentially impacting the drone's flight control integrity. The vulnerability does not expose confidentiality risks but threatens system integrity and availability. Exploitation does not require privileges or user interaction, increasing its risk profile. The flaw is addressed in PX4 version 1.17.0-rc2 by adding proper bounds checking to the packet copy operation. No public exploits have been reported to date, but the vulnerability's nature and ease of exploitation warrant prompt remediation in affected deployments.
Potential Impact
The primary impact of CVE-2026-32706 is on the integrity and availability of drone flight control systems using PX4 autopilot with CRSF enabled. Successful exploitation can cause memory corruption leading to crashes or unpredictable behavior of the autopilot software. This can result in loss of control or forced landing of drones, posing safety risks, especially in commercial, industrial, or governmental drone operations. Organizations relying on PX4 for critical drone missions—such as surveying, delivery, inspection, or defense—may experience operational disruptions, financial losses, or safety incidents. Since exploitation requires adjacency or direct serial access, remote attacks are less likely unless the CRSF interface is exposed over a network or physically accessible. However, insider threats or attackers with physical proximity could leverage this vulnerability. The lack of confidentiality impact limits data leakage concerns, but the availability and integrity risks are significant given the safety-critical nature of drone autopilots.
Mitigation Recommendations
1. Upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is patched with proper bounds checking. 2. Restrict access to the CRSF serial port by implementing physical security controls to prevent unauthorized proximity or connection. 3. If possible, disable the crsf_rc parser or CRSF protocol on serial ports that do not require it to reduce the attack surface. 4. Employ network segmentation and access controls to isolate drone control interfaces from untrusted networks or users. 5. Monitor drone system logs and behavior for anomalies that could indicate exploitation attempts or crashes. 6. Conduct regular security audits of drone firmware versions and configurations to ensure compliance with updated security standards. 7. For deployments with remote or wireless CRSF interfaces, consider additional encryption or authentication layers to prevent unauthorized packet injection. 8. Train operators and maintenance personnel on the importance of firmware updates and physical security around drone control hardware.
Affected Countries
United States, China, Germany, France, United Kingdom, Japan, South Korea, Australia, Canada, Israel
CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot
Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32706 is a classic buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control system for drones. The vulnerability exists in the crsf_rc parser component, which handles packets received over the CRSF serial protocol. Specifically, prior to version 1.17.0-rc2, the parser accepts variable-length known packets but copies them into a fixed-size global buffer of 64 bytes without verifying that the input size fits within this buffer. This lack of bounds checking leads to a buffer overflow condition when an oversized packet is processed. An attacker with access to the CRSF serial port—typically requiring adjacency or direct serial access—can send a maliciously crafted packet that triggers memory corruption. This corruption can cause the PX4 autopilot software to crash, resulting in denial of service and potentially impacting the drone's flight control integrity. The vulnerability does not expose confidentiality risks but threatens system integrity and availability. Exploitation does not require privileges or user interaction, increasing its risk profile. The flaw is addressed in PX4 version 1.17.0-rc2 by adding proper bounds checking to the packet copy operation. No public exploits have been reported to date, but the vulnerability's nature and ease of exploitation warrant prompt remediation in affected deployments.
Potential Impact
The primary impact of CVE-2026-32706 is on the integrity and availability of drone flight control systems using PX4 autopilot with CRSF enabled. Successful exploitation can cause memory corruption leading to crashes or unpredictable behavior of the autopilot software. This can result in loss of control or forced landing of drones, posing safety risks, especially in commercial, industrial, or governmental drone operations. Organizations relying on PX4 for critical drone missions—such as surveying, delivery, inspection, or defense—may experience operational disruptions, financial losses, or safety incidents. Since exploitation requires adjacency or direct serial access, remote attacks are less likely unless the CRSF interface is exposed over a network or physically accessible. However, insider threats or attackers with physical proximity could leverage this vulnerability. The lack of confidentiality impact limits data leakage concerns, but the availability and integrity risks are significant given the safety-critical nature of drone autopilots.
Mitigation Recommendations
1. Upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is patched with proper bounds checking. 2. Restrict access to the CRSF serial port by implementing physical security controls to prevent unauthorized proximity or connection. 3. If possible, disable the crsf_rc parser or CRSF protocol on serial ports that do not require it to reduce the attack surface. 4. Employ network segmentation and access controls to isolate drone control interfaces from untrusted networks or users. 5. Monitor drone system logs and behavior for anomalies that could indicate exploitation attempts or crashes. 6. Conduct regular security audits of drone firmware versions and configurations to ensure compliance with updated security standards. 7. For deployments with remote or wireless CRSF interfaces, consider additional encryption or authentication layers to prevent unauthorized packet injection. 8. Train operators and maintenance personnel on the importance of firmware updates and physical security around drone control hardware.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T14:33:42.823Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b481d42f860ef943b5ebc6
Added to database: 3/13/2026, 9:29:56 PM
Last enriched: 3/20/2026, 11:11:20 PM
Last updated: 4/28/2026, 4:38:11 AM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.