Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32707: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32707cvecve-2026-32707cwe-121
Published: Fri Mar 13 2026 (03/13/2026, 21:18:09 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tattu_can contains an unbounded memcpy in its multi-frame assembly loop, allowing stack memory overwrite when crafted CAN frames are processed. In deployments where tattu_can is enabled and running, a CAN-injection-capable attacker can trigger a crash (DoS) and memory corruption. This vulnerability is fixed in 1.17.0-rc2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:11:55 UTC

Technical Analysis

CVE-2026-32707 is a medium-severity stack-based buffer overflow vulnerability identified in the PX4-Autopilot, an open-source flight control software widely used in drones. The vulnerability resides in the tattu_can component, specifically in its multi-frame assembly loop, where an unbounded memcpy operation copies data from incoming CAN frames to a stack buffer without proper bounds checking. This flaw allows an attacker capable of injecting malicious CAN frames to overwrite stack memory, leading to memory corruption and potential program crashes. Since the vulnerability is triggered by processing crafted CAN frames, exploitation requires access to the drone's CAN bus or the ability to inject frames remotely if the CAN network is exposed. The impact is primarily denial-of-service due to crashes and corrupted memory, with no direct confidentiality loss. The vulnerability affects all PX4-Autopilot versions prior to 1.17.0-rc2 where tattu_can is enabled. The PX4 development team addressed this issue by introducing proper bounds checking and limiting the memcpy operation in version 1.17.0-rc2. There are no known exploits in the wild at this time, but the vulnerability poses a risk to drone operations, especially in environments where attackers can access the CAN bus. The CVSS v3.1 base score is 5.2, reflecting medium severity, with attack vector as physical (AV:P), low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact.

Potential Impact

The primary impact of CVE-2026-32707 is on the availability and integrity of drone flight control systems using vulnerable PX4-Autopilot versions with the tattu_can module enabled. Successful exploitation can cause drones to crash or behave unpredictably due to memory corruption, potentially leading to loss of control or mission failure. This can disrupt commercial drone operations, including delivery services, aerial surveying, agriculture monitoring, and critical infrastructure inspection. In military or government drone deployments, such disruptions could have strategic consequences. Since the vulnerability requires CAN frame injection, attackers with physical or network access to the CAN bus pose the greatest risk. The lack of confidentiality impact reduces the risk of data leakage, but the integrity and availability consequences can lead to safety hazards and operational downtime. Organizations relying on PX4-based drones should consider the operational risks of unpatched systems, especially in hostile or unsecured environments.

Mitigation Recommendations

To mitigate CVE-2026-32707, organizations should immediately upgrade PX4-Autopilot to version 1.17.0-rc2 or later, where the vulnerability is patched. If upgrading is not immediately feasible, disabling the tattu_can module can reduce exposure, provided that this does not impair critical functionality. Network segmentation and physical security controls should be enforced to prevent unauthorized access to the CAN bus, limiting the ability of attackers to inject malicious frames. Employing CAN bus message authentication or encryption, if supported, can further reduce risk. Regularly auditing drone firmware versions and configurations will help ensure vulnerable versions are not in use. Additionally, monitoring drone behavior for anomalies indicative of memory corruption or crashes can provide early warning of exploitation attempts. Developers should review other CAN-related code for similar unbounded memory operations to prevent future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b481d42f860ef943b5ebc9

Added to database: 3/13/2026, 9:29:56 PM

Last enriched: 3/20/2026, 11:11:55 PM

Last updated: 4/28/2026, 7:20:01 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses