Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32706: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in PX4 PX4-Autopilot

0
High
VulnerabilityCVE-2026-32706cvecve-2026-32706cwe-120cwe-787
Published: Fri Mar 13 2026 (03/13/2026, 21:17:02 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:11:20 UTC

Technical Analysis

CVE-2026-32706 is a classic buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control system for drones. The vulnerability exists in the crsf_rc parser component, which handles packets received over the CRSF serial protocol. Specifically, prior to version 1.17.0-rc2, the parser accepts variable-length known packets but copies them into a fixed-size global buffer of 64 bytes without verifying that the input size fits within this buffer. This lack of bounds checking leads to a buffer overflow condition when an oversized packet is processed. An attacker with access to the CRSF serial port—typically requiring adjacency or direct serial access—can send a maliciously crafted packet that triggers memory corruption. This corruption can cause the PX4 autopilot software to crash, resulting in denial of service and potentially impacting the drone's flight control integrity. The vulnerability does not expose confidentiality risks but threatens system integrity and availability. Exploitation does not require privileges or user interaction, increasing its risk profile. The flaw is addressed in PX4 version 1.17.0-rc2 by adding proper bounds checking to the packet copy operation. No public exploits have been reported to date, but the vulnerability's nature and ease of exploitation warrant prompt remediation in affected deployments.

Potential Impact

The primary impact of CVE-2026-32706 is on the integrity and availability of drone flight control systems using PX4 autopilot with CRSF enabled. Successful exploitation can cause memory corruption leading to crashes or unpredictable behavior of the autopilot software. This can result in loss of control or forced landing of drones, posing safety risks, especially in commercial, industrial, or governmental drone operations. Organizations relying on PX4 for critical drone missions—such as surveying, delivery, inspection, or defense—may experience operational disruptions, financial losses, or safety incidents. Since exploitation requires adjacency or direct serial access, remote attacks are less likely unless the CRSF interface is exposed over a network or physically accessible. However, insider threats or attackers with physical proximity could leverage this vulnerability. The lack of confidentiality impact limits data leakage concerns, but the availability and integrity risks are significant given the safety-critical nature of drone autopilots.

Mitigation Recommendations

1. Upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is patched with proper bounds checking. 2. Restrict access to the CRSF serial port by implementing physical security controls to prevent unauthorized proximity or connection. 3. If possible, disable the crsf_rc parser or CRSF protocol on serial ports that do not require it to reduce the attack surface. 4. Employ network segmentation and access controls to isolate drone control interfaces from untrusted networks or users. 5. Monitor drone system logs and behavior for anomalies that could indicate exploitation attempts or crashes. 6. Conduct regular security audits of drone firmware versions and configurations to ensure compliance with updated security standards. 7. For deployments with remote or wireless CRSF interfaces, consider additional encryption or authentication layers to prevent unauthorized packet injection. 8. Train operators and maintenance personnel on the importance of firmware updates and physical security around drone control hardware.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.823Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b481d42f860ef943b5ebc6

Added to database: 3/13/2026, 9:29:56 PM

Last enriched: 3/20/2026, 11:11:20 PM

Last updated: 4/28/2026, 4:38:11 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses