Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2.
Published: 2026-03-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Stack Overflow resulting in Denial of Service
Action: Patch
AI Analysis

Impact

Zenoh uORB subscriber in PX4 autoinit autopilot fails to bound the length of a variable-length array allocated on the stack from the payload length reported by a remote Zenoh publisher. An attacker can send a fragmented message with an oversized length to force an unbounded stack allocation and subsequent write beyond the bounds, overflowing the call stack and crashing the Zenoh bridge task. The crash prevents further function of the bridge, effectively denying service for any flight control operations dependent on that task. The weakness responsible is a classic stack buffer overflow, corresponding to CWE‑121.

Affected Systems

The flaw applies to PX4 Autopilot builds prior to version 1.17.0‑rc2, including the 1.17.0‑alpha1, 1.17.0‑beta1, 1.17.0‑rc1 releases and any earlier returns. The advisory states the issue is fixed in 1.17.0‑rc2 and later updates of PX4 Autopilot.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity. EPSS is below 1 %, suggesting a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. The vulnerability can be exploited remotely by acting as a Zenoh publisher, sending an oversized fragmented message that forces a stack overflow and causes a crash of the bridge task. The impact is limited to denial of service and does not directly compromise confidentiality or integrity.

Generated by OpenCVE AI on March 16, 2026 at 23:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PX4 Autopilot to version 1.17.0‑rc2 or later
  • Verify that the build version has been updated after applying the patch
  • Monitor system logs and stability to detect any remaining interruptions

Generated by OpenCVE AI on March 16, 2026 at 23:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dronecode
Dronecode px4 Drone Autopilot
CPEs cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc1:*:*:*:*:*:*
Vendors & Products Dronecode
Dronecode px4 Drone Autopilot

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Px4
Px4 px4-autopilot
Vendors & Products Px4
Px4 px4-autopilot

Fri, 13 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2.
Title Zenoh uORB Subscriber Allows Arbitrary Stack Allocation (PX4/PX4-Autopilot)
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dronecode Px4 Drone Autopilot
Px4 Px4-autopilot
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-17T15:32:42.537Z

Reserved: 2026-03-13T14:33:42.824Z

Link: CVE-2026-32708

cve-icon Vulnrichment

Updated: 2026-03-17T15:32:32.014Z

cve-icon NVD

Status : Modified

Published: 2026-03-16T14:19:41.960

Modified: 2026-03-17T16:16:23.157

Link: CVE-2026-32708

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:20Z

Weaknesses