Description
A security vulnerability has been detected in AprilRobotics apriltag up to 3.4.5. Affected by this vulnerability is the function apriltag_detector_detect of the file apriltag.c. The manipulation leads to memory corruption. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is cfac2f5ce1ffe2de25967eb1ab80bc5d99fc1a61. It is suggested to install a patch to address this issue.
Published: 2026-02-09
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Apply Patch
AI Analysis

Impact

The flaw occurs in the apriltag_detector_detect function within the apriltag.c source file of the AprilRobotics apriltag library, versions up to 3.4.5. An attacker that can execute code locally can supply crafted inputs that trigger a memory corruption bug. The description does not state that the corruption leads to arbitrary code execution or privilege escalation, but the breach of memory integrity could potentially be leveraged for further exploitation depending on the surrounding context.

Affected Systems

AprilRobotics’ apriltag library, with affected releases up to and including version 3.4.5. Any deployment that uses these versions is vulnerable; newer releases are not impacted.

Risk and Exploitability

The CVSS score of 4.8 places the vulnerability in the moderate range, and the EPSS score of less than 1% signals a low probability that active exploitation will occur. The vulnerability is not listed in the CISA KEV catalog, and the attack vector is local. Because the exploit requires local execution, the risk is limited to environments where an attacker can run arbitrary code on the host that uses the apriltag library. The associated CWE-119 identifies the flaw as a buffer or memory safety issue.

Generated by OpenCVE AI on April 17, 2026 at 21:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch identified by commit cfac2f5ce1ffe2de25967eb1ab80bc5d99fc1a61 or upgrade to a release newer than 3.4.5.
  • Install the patched or upgraded library only on machines that process untrusted input, limiting the impact if the vulnerability is triggered.
  • Monitor local execution contexts for unexpected memory usage or abnormal process behavior to detect attempts to exploit the flaw.

Generated by OpenCVE AI on April 17, 2026 at 21:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Aprilrobotics
Aprilrobotics apriltag
Vendors & Products Aprilrobotics
Aprilrobotics apriltag

Mon, 09 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in AprilRobotics apriltag up to 3.4.5. Affected by this vulnerability is the function apriltag_detector_detect of the file apriltag.c. The manipulation leads to memory corruption. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is cfac2f5ce1ffe2de25967eb1ab80bc5d99fc1a61. It is suggested to install a patch to address this issue.
Title AprilRobotics apriltag apriltag.c apriltag_detector_detect memory corruption
Weaknesses CWE-119
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Aprilrobotics Apriltag
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:01:08.922Z

Reserved: 2026-02-09T12:15:21.978Z

Link: CVE-2026-2246

cve-icon Vulnrichment

Updated: 2026-02-10T20:02:23.427Z

cve-icon NVD

Status : Deferred

Published: 2026-02-09T20:15:59.467

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:30:28Z

Weaknesses