Description
This vulnerability applies to the Micro Air Vehicle Link (MAVLink) protocol and allows a remote attacker to gain access to sensitive information provided it has access to the communication medium. MAVLink is a header-based protocol that does not perform encryption to improve transfer (and reception speed) and efficiency by design. The increasing popularity of the protocol (used accross different autopilots) has led to its use in wired and wireless mediums through insecure communication channels exposing sensitive information to a remote attacker with ability to intercept network traffic.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2736 | This vulnerability applies to the Micro Air Vehicle Link (MAVLink) protocol and allows a remote attacker to gain access to sensitive information provided it has access to the communication medium. MAVLink is a header-based protocol that does not perform encryption to improve transfer (and reception speed) and efficiency by design. The increasing popularity of the protocol (used accross different autopilots) has led to its use in wired and wireless mediums through insecure communication channels exposing sensitive information to a remote attacker with ability to intercept network traffic. |
References
History
No history.
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-16T20:37:09.108Z
Reserved: 2020-03-10T00:00:00.000Z
Link: CVE-2020-10281
No data.
Status : Modified
Published: 2020-07-03T15:15:09.777
Modified: 2024-11-21T04:55:07.917
Link: CVE-2020-10281
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD