CVE-2026-32707

Published Mar 16, 2026

Last updated a month ago

Overview

Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tattu_can contains an unbounded memcpy in its multi-frame assembly loop, allowing stack memory overwrite when crafted CAN frames are processed. In deployments where tattu_can is enabled and running, a CAN-injection-capable attacker can trigger a crash (DoS) and memory corruption. This vulnerability is fixed in 1.17.0-rc2.
Source
security-advisories@github.com
NVD status
Modified
Products
px4_drone_autopilot

Risk scores

CVSS 3.1

Type
Primary
Base score
6.1
Impact score
5.2
Exploitability score
0.9
Vector string
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Severity
MEDIUM

Weaknesses

security-advisories@github.com
CWE-121

Social media

Hype score
Not currently trending

Configurations