PX4 Autopilot
PX4 Autopilot v1.16.0_SITL_latest_stable contains a vulnerability in the MAVLink interface that allows an attacker with access to the MAVLink communication link (telemetry radio, network port, or serial connection) to execute arbitrary shell commands without cryptographic authentication. The vulnerability exists because the MAVLink interface does not validate message authenticity, allowing unauthenticated commands to be accepted and executed by the autopilot. This could allow an attacker to take control of flight operations, alter vehicle behavior, or compromise the system.
- Network or physical access to the MAVLink communication link (e.g., telemetry radio, network port, or serial connection)
- MAVLink 2.0 message signing not enabled on the system
- Ability to send MAVLink-formatted packets to the autopilot
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e20716e8-d3af-406e-8050-57fb38a195fdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.