Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32709: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32709cvecve-2026-32709cwe-22
Published: Fri Mar 13 2026 (03/13/2026, 21:19:33 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32709 is a path traversal vulnerability in PX4 Autopilot's MAVLink FTP implementation affecting versions prior to 1. 17. 0-rc2. It allows unauthenticated attackers to perform arbitrary file operations including read, write, create, delete, and rename on the flight controller filesystem. On NuttX targets, the FTP root directory is empty, enabling direct filesystem access without path sanitization. On POSIX targets, write-path validation is ineffective, and a TOCTOU race condition further bypasses protections on NuttX. This vulnerability can be exploited remotely by any MAVLink peer without authentication, posing risks to confidentiality and integrity of the system. The issue is fixed in version 1. 17. 0-rc2.

AI-Powered Analysis

AILast updated: 03/13/2026, 22:00:38 UTC

Technical Analysis

PX4 Autopilot is an open-source flight control software widely used in drone systems. Prior to version 1.17.0-rc2, its MAVLink FTP implementation contains a critical path traversal vulnerability (CWE-22) identified as CVE-2026-32709. This flaw allows an unauthenticated MAVLink peer to bypass directory restrictions and perform arbitrary file system operations on the flight controller. Specifically, on NuttX-based targets, the FTP root directory is set as an empty string, meaning that attacker-supplied file paths are passed directly to system calls without any prefix or sanitization, enabling unrestricted file access. On POSIX targets such as Linux companion computers or SITL (Software In The Loop) simulations, the write-path validation function always returns true, effectively disabling any protection against unauthorized file writes. Additionally, a Time-Of-Check to Time-Of-Use (TOCTOU) race condition in the write validation on NuttX targets allows attackers to bypass the only existing guard mechanism. This combination of issues means that an attacker can remotely read, write, create, delete, or rename arbitrary files on the flight controller filesystem without any authentication or user interaction. The vulnerability impacts confidentiality and integrity but does not directly affect availability. The vulnerability was publicly disclosed and fixed in PX4 Autopilot version 1.17.0-rc2. No known exploits in the wild have been reported to date. The CVSS 3.1 base score is 5.4, reflecting medium severity due to network attack vector, no privileges required, and no user interaction needed, but limited impact on availability and scope.

Potential Impact

The vulnerability allows attackers to gain unauthorized access to the flight controller's filesystem, potentially exposing sensitive configuration files, flight logs, or cryptographic keys, thereby compromising confidentiality. Attackers can also modify or delete critical files, undermining the integrity of the autopilot software and potentially causing erratic or unsafe drone behavior. This could lead to loss of control, mission failure, or safety hazards, especially in commercial, industrial, or governmental drone operations. Although availability is not directly impacted, the integrity compromise could indirectly cause operational disruptions. The lack of authentication and remote exploitability significantly increases the risk, as any MAVLink peer can exploit the flaw without user interaction. Organizations relying on PX4 for drone control, including manufacturers, service providers, and research institutions, face risks of data theft, operational sabotage, and regulatory non-compliance if unpatched systems are exploited.

Mitigation Recommendations

The primary mitigation is to upgrade PX4 Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should restrict network access to MAVLink interfaces, ensuring only trusted and authenticated peers can connect. Implement network segmentation and firewall rules to isolate flight controllers and companion computers from untrusted networks. Monitor MAVLink traffic for anomalous FTP commands or unusual file operations. Employ runtime integrity checks on critical files and configurations to detect unauthorized modifications. For deployments on NuttX targets, consider disabling MAVLink FTP functionality if not required. Additionally, drone operators should enforce strict operational security policies, including limiting physical and network access to drone control systems. Vendors should review and harden path validation logic and eliminate TOCTOU race conditions in their codebase to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b485502f860ef943b833ea

Added to database: 3/13/2026, 9:44:48 PM

Last enriched: 3/13/2026, 10:00:38 PM

Last updated: 3/14/2026, 4:44:48 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses