Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a heap-use-after-free is detected in the MavlinkShell::available() function. The issue is caused by a race condition between the MAVLink receiver thread (which handles shell creation/destruction) and the telemetry sender thread (which polls the shell for available output). The issue is remotely triggerable via MAVLink SERIAL_CONTROL messages (ID 126), which can be sent by an external ground station or automated script. This vulnerability is fixed in 1.17.0-rc1.
Published: 2026-03-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Immediate Patch
AI Analysis

Impact

PX4 Autopilot contains a heap-use-after-free vulnerability in the MavlinkShell::available() function; the flaw arises from a race condition between the MAVLink receiver thread and the telemetry sender thread, enabling improper deallocation of shell memory. This can lead to memory corruption, potentially causing a system crash or other integrity violations as the impacted firmware is not correctly initialized.

Affected Systems

The vulnerability applies to PX4 Autopilot firmware versions released prior to 1.17.0-rc1, including the 1.17.0 alpha1 and beta1 releases, as well as all earlier builds. The affected vendor is PX4:PX4-Autopilot.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% reflects a low likelihood of exploitation. The issue is not listed in the CISA KEV catalog. It is remotely triggerable via MAVLink SERIAL_CONTROL (ID 126) messages that can be sent from any external ground station or script, but exploiting the race condition requires precise timing of MAVLink packets. Considering the moderate impact and low probability, patching remains the most prudent response.

Generated by OpenCVE AI on March 16, 2026 at 23:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PX4 Autopilot firmware to version 1.17.0-rc1 or later to eliminate the race condition.
  • Verify that the UAV firmware reflects the patched version before deployment.

Generated by OpenCVE AI on March 16, 2026 at 23:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Dronecode
Dronecode px4 Drone Autopilot
CPEs cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:*
Vendors & Products Dronecode
Dronecode px4 Drone Autopilot

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Px4
Px4 px4-autopilot
Vendors & Products Px4
Px4 px4-autopilot

Fri, 13 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a heap-use-after-free is detected in the MavlinkShell::available() function. The issue is caused by a race condition between the MAVLink receiver thread (which handles shell creation/destruction) and the telemetry sender thread (which polls the shell for available output). The issue is remotely triggerable via MAVLink SERIAL_CONTROL messages (ID 126), which can be sent by an external ground station or automated script. This vulnerability is fixed in 1.17.0-rc1.
Title PX4 autopilot has a heap Use-After-Free in MavlinkShell::available() via SERIAL_CONTROL Race Condition
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Dronecode Px4 Drone Autopilot
Px4 Px4-autopilot
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T20:22:43.754Z

Reserved: 2026-03-13T15:02:00.625Z

Link: CVE-2026-32724

cve-icon Vulnrichment

Updated: 2026-03-16T20:20:41.823Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:43.203

Modified: 2026-03-16T18:33:49.930

Link: CVE-2026-32724

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:12Z

Weaknesses