CVE-2024-39835

Published Jul 17, 2025

Last updated 7 months ago

Overview

Description
A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.
Source
security@ubuntu.com
NVD status
Analyzed
Products
robot_operating_system

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

security@ubuntu.com
CWE-94
nvd@nist.gov
CWE-94

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.