CVE-2026-32709: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PX4 PX4-Autopilot
CVE-2026-32709 is a path traversal vulnerability in PX4 Autopilot's MAVLink FTP implementation affecting versions prior to 1. 17. 0-rc2. It allows unauthenticated attackers to perform arbitrary file operations including read, write, create, delete, and rename on the flight controller filesystem. On NuttX targets, the FTP root directory is empty, enabling direct filesystem access without path sanitization. On POSIX targets, write-path validation is ineffective, and a TOCTOU race condition further bypasses protections on NuttX. This vulnerability can be exploited remotely by any MAVLink peer without authentication, posing risks to confidentiality and integrity of the system. The issue is fixed in version 1. 17. 0-rc2.
AI Analysis
Technical Summary
PX4 Autopilot is an open-source flight control software widely used in drone systems. Prior to version 1.17.0-rc2, its MAVLink FTP implementation contains a critical path traversal vulnerability (CWE-22) identified as CVE-2026-32709. This flaw allows an unauthenticated MAVLink peer to bypass directory restrictions and perform arbitrary file system operations on the flight controller. Specifically, on NuttX-based targets, the FTP root directory is set as an empty string, meaning that attacker-supplied file paths are passed directly to system calls without any prefix or sanitization, enabling unrestricted file access. On POSIX targets such as Linux companion computers or SITL (Software In The Loop) simulations, the write-path validation function always returns true, effectively disabling any protection against unauthorized file writes. Additionally, a Time-Of-Check to Time-Of-Use (TOCTOU) race condition in the write validation on NuttX targets allows attackers to bypass the only existing guard mechanism. This combination of issues means that an attacker can remotely read, write, create, delete, or rename arbitrary files on the flight controller filesystem without any authentication or user interaction. The vulnerability impacts confidentiality and integrity but does not directly affect availability. The vulnerability was publicly disclosed and fixed in PX4 Autopilot version 1.17.0-rc2. No known exploits in the wild have been reported to date. The CVSS 3.1 base score is 5.4, reflecting medium severity due to network attack vector, no privileges required, and no user interaction needed, but limited impact on availability and scope.
Potential Impact
The vulnerability allows attackers to gain unauthorized access to the flight controller's filesystem, potentially exposing sensitive configuration files, flight logs, or cryptographic keys, thereby compromising confidentiality. Attackers can also modify or delete critical files, undermining the integrity of the autopilot software and potentially causing erratic or unsafe drone behavior. This could lead to loss of control, mission failure, or safety hazards, especially in commercial, industrial, or governmental drone operations. Although availability is not directly impacted, the integrity compromise could indirectly cause operational disruptions. The lack of authentication and remote exploitability significantly increases the risk, as any MAVLink peer can exploit the flaw without user interaction. Organizations relying on PX4 for drone control, including manufacturers, service providers, and research institutions, face risks of data theft, operational sabotage, and regulatory non-compliance if unpatched systems are exploited.
Mitigation Recommendations
The primary mitigation is to upgrade PX4 Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should restrict network access to MAVLink interfaces, ensuring only trusted and authenticated peers can connect. Implement network segmentation and firewall rules to isolate flight controllers and companion computers from untrusted networks. Monitor MAVLink traffic for anomalous FTP commands or unusual file operations. Employ runtime integrity checks on critical files and configurations to detect unauthorized modifications. For deployments on NuttX targets, consider disabling MAVLink FTP functionality if not required. Additionally, drone operators should enforce strict operational security policies, including limiting physical and network access to drone control systems. Vendors should review and harden path validation logic and eliminate TOCTOU race conditions in their codebase to prevent similar vulnerabilities.
Affected Countries
United States, China, Germany, France, Japan, South Korea, United Kingdom, Canada, Australia, Israel
CVE-2026-32709: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PX4 PX4-Autopilot
Description
CVE-2026-32709 is a path traversal vulnerability in PX4 Autopilot's MAVLink FTP implementation affecting versions prior to 1. 17. 0-rc2. It allows unauthenticated attackers to perform arbitrary file operations including read, write, create, delete, and rename on the flight controller filesystem. On NuttX targets, the FTP root directory is empty, enabling direct filesystem access without path sanitization. On POSIX targets, write-path validation is ineffective, and a TOCTOU race condition further bypasses protections on NuttX. This vulnerability can be exploited remotely by any MAVLink peer without authentication, posing risks to confidentiality and integrity of the system. The issue is fixed in version 1. 17. 0-rc2.
AI-Powered Analysis
Technical Analysis
PX4 Autopilot is an open-source flight control software widely used in drone systems. Prior to version 1.17.0-rc2, its MAVLink FTP implementation contains a critical path traversal vulnerability (CWE-22) identified as CVE-2026-32709. This flaw allows an unauthenticated MAVLink peer to bypass directory restrictions and perform arbitrary file system operations on the flight controller. Specifically, on NuttX-based targets, the FTP root directory is set as an empty string, meaning that attacker-supplied file paths are passed directly to system calls without any prefix or sanitization, enabling unrestricted file access. On POSIX targets such as Linux companion computers or SITL (Software In The Loop) simulations, the write-path validation function always returns true, effectively disabling any protection against unauthorized file writes. Additionally, a Time-Of-Check to Time-Of-Use (TOCTOU) race condition in the write validation on NuttX targets allows attackers to bypass the only existing guard mechanism. This combination of issues means that an attacker can remotely read, write, create, delete, or rename arbitrary files on the flight controller filesystem without any authentication or user interaction. The vulnerability impacts confidentiality and integrity but does not directly affect availability. The vulnerability was publicly disclosed and fixed in PX4 Autopilot version 1.17.0-rc2. No known exploits in the wild have been reported to date. The CVSS 3.1 base score is 5.4, reflecting medium severity due to network attack vector, no privileges required, and no user interaction needed, but limited impact on availability and scope.
Potential Impact
The vulnerability allows attackers to gain unauthorized access to the flight controller's filesystem, potentially exposing sensitive configuration files, flight logs, or cryptographic keys, thereby compromising confidentiality. Attackers can also modify or delete critical files, undermining the integrity of the autopilot software and potentially causing erratic or unsafe drone behavior. This could lead to loss of control, mission failure, or safety hazards, especially in commercial, industrial, or governmental drone operations. Although availability is not directly impacted, the integrity compromise could indirectly cause operational disruptions. The lack of authentication and remote exploitability significantly increases the risk, as any MAVLink peer can exploit the flaw without user interaction. Organizations relying on PX4 for drone control, including manufacturers, service providers, and research institutions, face risks of data theft, operational sabotage, and regulatory non-compliance if unpatched systems are exploited.
Mitigation Recommendations
The primary mitigation is to upgrade PX4 Autopilot to version 1.17.0-rc2 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should restrict network access to MAVLink interfaces, ensuring only trusted and authenticated peers can connect. Implement network segmentation and firewall rules to isolate flight controllers and companion computers from untrusted networks. Monitor MAVLink traffic for anomalous FTP commands or unusual file operations. Employ runtime integrity checks on critical files and configurations to detect unauthorized modifications. For deployments on NuttX targets, consider disabling MAVLink FTP functionality if not required. Additionally, drone operators should enforce strict operational security policies, including limiting physical and network access to drone control systems. Vendors should review and harden path validation logic and eliminate TOCTOU race conditions in their codebase to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T14:33:42.824Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b485502f860ef943b833ea
Added to database: 3/13/2026, 9:44:48 PM
Last enriched: 3/13/2026, 10:00:38 PM
Last updated: 3/14/2026, 4:44:48 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.