Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32724: CWE-416: Use After Free in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32724cvecve-2026-32724cwe-416
Published: Fri Mar 13 2026 (03/13/2026, 21:39:19 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32724 is a use-after-free vulnerability in PX4-Autopilot versions prior to 1. 17. 0-rc1. It arises from a race condition between MAVLink receiver and telemetry sender threads in the MavlinkShell::available() function. The flaw can be remotely triggered via MAVLink SERIAL_CONTROL messages (ID 126) sent by an external ground station or automated script. Exploitation can cause a heap-use-after-free leading to potential denial of service by crashing the autopilot software. No confidentiality or integrity impact is reported. The vulnerability requires network access but no authentication or user interaction. PX4 has fixed this issue in version 1. 17.

AI-Powered Analysis

AILast updated: 03/13/2026, 22:14:19 UTC

Technical Analysis

CVE-2026-32724 is a heap-use-after-free vulnerability identified in the PX4-Autopilot flight control software for drones, specifically affecting versions prior to 1.17.0-rc1. The root cause is a race condition between two concurrent threads: the MAVLink receiver thread, responsible for creating and destroying shell instances, and the telemetry sender thread, which polls these shells for output availability. This concurrency flaw occurs in the MavlinkShell::available() function, where the telemetry sender thread may access memory that has already been freed by the receiver thread, leading to undefined behavior and potential crashes. The vulnerability is remotely triggerable via MAVLink SERIAL_CONTROL messages (message ID 126), which can be sent by any external entity with network access to the drone's MAVLink interface, such as a ground control station or an automated script. Exploiting this flaw does not require authentication or user interaction but does require network-level access to the MAVLink communication channel. The primary impact is on availability, as exploitation can cause the autopilot software to crash or behave unpredictably, potentially resulting in loss of drone control or mission failure. There is no indication of confidentiality or integrity compromise. PX4 addressed this issue in version 1.17.0-rc1 by fixing the race condition and ensuring proper synchronization between threads. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.3, reflecting medium severity due to the remote triggerability and impact on availability, balanced by the requirement for network access and the complexity of exploitation.

Potential Impact

The primary impact of CVE-2026-32724 is on the availability of drone flight control systems using vulnerable PX4-Autopilot versions. Successful exploitation can cause heap-use-after-free conditions leading to crashes or unpredictable behavior of the autopilot software. This can result in loss of control over drones during flight, potentially causing mission failures, physical damage to the drone, or safety hazards to people and property nearby. Since PX4 is widely used in commercial, research, and hobbyist drone platforms, organizations relying on these drones for critical operations such as surveying, delivery, inspection, or defense could face operational disruptions. However, the vulnerability does not affect confidentiality or integrity, so data theft or manipulation is not a direct concern. The requirement for network access to the MAVLink interface limits the attack surface to entities able to communicate with the drone’s telemetry system, which may be mitigated by network segmentation or secure communication channels. Nonetheless, the risk remains significant for drones operating in exposed or hostile environments where attackers can send crafted MAVLink messages.

Mitigation Recommendations

To mitigate CVE-2026-32724, organizations should immediately upgrade PX4-Autopilot software to version 1.17.0-rc1 or later, where the race condition is resolved. In addition to patching, implement strict network controls to limit access to the MAVLink interface, such as using firewalls, VPNs, or encrypted communication channels to prevent unauthorized message injection. Employ authentication and message integrity mechanisms for MAVLink communications where possible to reduce the risk of malicious commands. Monitor drone telemetry and logs for unusual or unexpected SERIAL_CONTROL messages that could indicate exploitation attempts. For critical deployments, consider isolating drone control networks from public or untrusted networks. Conduct regular security assessments and code reviews on drone software to detect concurrency issues and other vulnerabilities early. Finally, maintain an incident response plan tailored to drone operations to quickly address any autopilot failures or suspicious activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.625Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b488d62f860ef943ba416b

Added to database: 3/13/2026, 9:59:50 PM

Last enriched: 3/13/2026, 10:14:19 PM

Last updated: 3/13/2026, 11:12:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses