Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tattu_can contains an unbounded memcpy in its multi-frame assembly loop, allowing stack memory overwrite when crafted CAN frames are processed. In deployments where tattu_can is enabled and running, a CAN-injection-capable attacker can trigger a crash (DoS) and memory corruption. This vulnerability is fixed in 1.17.0-rc2.
Published: 2026-03-13
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service and Memory Corruption
Action: Apply Patch
AI Analysis

Impact

PX4 Autopilot contains an unbounded memcpy in the tattu_can component’s multi‑frame assembly loop, causing a stack buffer overflow. When the driver processes crafted CAN frames, the overflow can overwrite adjacent stack data, leading to a crash (Denial of Service) and potential memory corruption. The weakness is classified as CWE‑121: Stack‑Based Buffer Overflow.

Affected Systems

The affected product is PX4 Autopilot (PX4:PX4‑Autopilot). All releases prior to 1.17.0‑rc2 are vulnerable, including the alpha1, beta1, and rc1 milestones listed in the CPE data. Devices that have tattu_can compiled and enabled are impacted; if the driver is disabled or not used, the vulnerability is not present.

Risk and Exploitability

The CVSS score is 5.2, indicating moderate severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is injection of crafted CAN frames over the vehicle’s CAN bus; this inference is based on the description, which states that the overflow is triggered when tattu_can processes incoming CAN traffic. In deployments where the CAN bus is isolated from untrusted networks, the practical risk is reduced, but any exposed bus provides a feasible exploitation path.

Generated by OpenCVE AI on March 16, 2026 at 23:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PX4 Autopilot to version 1.17.0‑rc2 or later, which includes the required buffer‑safety fix

Generated by OpenCVE AI on March 16, 2026 at 23:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dronecode
Dronecode px4 Drone Autopilot
CPEs cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc1:*:*:*:*:*:*
Vendors & Products Dronecode
Dronecode px4 Drone Autopilot

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Px4
Px4 px4-autopilot
Vendors & Products Px4
Px4 px4-autopilot

Fri, 13 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tattu_can contains an unbounded memcpy in its multi-frame assembly loop, allowing stack memory overwrite when crafted CAN frames are processed. In deployments where tattu_can is enabled and running, a CAN-injection-capable attacker can trigger a crash (DoS) and memory corruption. This vulnerability is fixed in 1.17.0-rc2.
Title PX4 autopilot has a stack buffer overflow in tattu_can due to unbounded memcpy in frame assembly loop
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}


Subscriptions

Dronecode Px4 Drone Autopilot
Px4 Px4-autopilot
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-17T15:34:02.447Z

Reserved: 2026-03-13T14:33:42.824Z

Link: CVE-2026-32707

cve-icon Vulnrichment

Updated: 2026-03-17T15:33:57.555Z

cve-icon NVD

Status : Modified

Published: 2026-03-16T14:19:41.783

Modified: 2026-03-17T16:16:23.027

Link: CVE-2026-32707

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:21Z

Weaknesses