Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32707: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32707cvecve-2026-32707cwe-121
Published: Fri Mar 13 2026 (03/13/2026, 21:18:09 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32707 is a stack-based buffer overflow vulnerability in the PX4-Autopilot flight control software used for drones. The flaw exists in the tattu_can module prior to version 1. 17. 0-rc2, where an unbounded memcpy in the multi-frame assembly loop allows crafted CAN frames to overwrite stack memory. An attacker capable of injecting CAN frames can cause a denial-of-service crash and memory corruption. This vulnerability does not require authentication or user interaction but requires physical or network access to the CAN bus. The vulnerability has a CVSS score of 5. 2, indicating medium severity. No known exploits are currently reported in the wild. The issue is fixed in PX4 version 1.

AI-Powered Analysis

AILast updated: 03/13/2026, 21:45:13 UTC

Technical Analysis

PX4-Autopilot is an open-source flight control software widely used in drone platforms. The vulnerability CVE-2026-32707 is a stack-based buffer overflow categorized under CWE-121, found in the tattu_can module responsible for processing CAN (Controller Area Network) frames. Specifically, prior to version 1.17.0-rc2, the multi-frame assembly loop uses an unbounded memcpy operation without proper bounds checking, allowing an attacker who can inject maliciously crafted CAN frames to overwrite stack memory. This memory corruption can lead to a crash, causing a denial-of-service (DoS) condition, and potentially other unpredictable behavior due to corrupted memory. Exploitation requires the attacker to have the capability to send arbitrary CAN frames to the device, which typically implies physical access or network access to the CAN bus. The vulnerability does not impact confidentiality but affects integrity and availability. The flaw is fixed in PX4 version 1.17.0-rc2 by adding proper bounds checking and memory handling in the tattu_can module. No public exploits have been reported, but the vulnerability poses a risk in environments where CAN injection is feasible.

Potential Impact

The primary impact of this vulnerability is denial of service through a crash of the PX4-Autopilot system, which can disrupt drone operations. In safety-critical drone deployments, such as delivery, inspection, or military applications, this can lead to loss of control, mission failure, or physical damage. Memory corruption might also be leveraged for further exploitation, though no such exploits are known currently. Organizations relying on PX4 for drone operations could face operational downtime, safety risks, and potential financial losses. The requirement for CAN injection limits the attack surface to environments where attackers can access the CAN bus, which may be physical proximity or compromised network segments. However, as drones become more connected and integrated into critical infrastructure, the risk of remote or insider attacks increases. The medium CVSS score reflects moderate risk but with significant operational implications in affected contexts.

Mitigation Recommendations

Organizations should upgrade PX4-Autopilot installations to version 1.17.0-rc2 or later, where the vulnerability is patched. For environments where immediate upgrade is not possible, network segmentation and strict access controls should be enforced to restrict access to the CAN bus, preventing unauthorized CAN frame injection. Employ monitoring and anomaly detection on CAN traffic to identify suspicious frame patterns indicative of exploitation attempts. Physical security controls should be enhanced to prevent unauthorized access to drone hardware and communication interfaces. Additionally, implement secure boot and firmware integrity verification to detect unauthorized modifications. Developers should review and harden any other CAN frame processing code to ensure robust bounds checking and memory safety. Regular vulnerability assessments and penetration testing targeting drone communication interfaces are recommended to identify potential attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b481d42f860ef943b5ebc9

Added to database: 3/13/2026, 9:29:56 PM

Last enriched: 3/13/2026, 9:45:13 PM

Last updated: 3/14/2026, 3:21:35 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses