Cyber Posture

CVE-2026-26742

HighPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0005 15.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26742 is a high-severity Missing Authorization (CWE-862) vulnerability in Dronecode Px4 Drone Autopilot. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 15.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SA-8 (Security and Privacy Engineering Principles) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, prioritization, and correction of the specific software flaw in re-arm grace period logic that bypasses pre-flight safety checks.

detect

Verifies correct operation of security functions like pre-flight safety checks and re-arm logic to detect incorrect application of in-air emergency procedures to ground scenarios.

prevent

Applies security engineering principles during system development to prevent logic errors that enable bypass of safety checks during mode transitions and re-arming.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The logic flaw in PX4's remote flight-control interface (mode switch + re-arm commands over adjacent network) directly enables exploitation of the exposed remote service to bypass safety checks and induce loss of control.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism failure in the "Re-arm Grace Period" logic. The system incorrectly applies the in-air emergency re-arm logic to ground scenarios. If a pilot switches to Manual mode and re-arms within 5…

more

seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This allows for an immediate high-thrust takeoff if the throttle stick is raised, leading to loss of control.

Deeper analysisAI

CVE-2026-26742 is a protection mechanism failure (CWE-862) in the "Re-arm Grace Period" logic of PX4 Autopilot versions 1.12.x through 1.15.x. The vulnerability causes the system to incorrectly apply in-air emergency re-arm logic to ground scenarios. Specifically, if a pilot switches to Manual mode and re-arms within 5 seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This enables an immediate high-thrust takeoff if the throttle stick is raised, potentially resulting in loss of control. The issue carries a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).

An attacker with adjacent network access can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. By manipulating the drone into an automatic landing followed by a Manual mode switch and re-arm within the grace period, the attacker can trigger the bypass of safety checks. Successful exploitation leads to high-impact disruption of integrity and availability, as the drone may execute uncontrolled high-thrust maneuvers, causing physical damage or crashes.

Mitigation details and further analysis are available in the referenced advisory at https://github.com/npuwyw/PX4-Autopilot/blob/audit-v1.12.3-mode-transition-logic-flaw/PX4_Autopilot_Mode_Switching_Logic_Vulnerability.md.

Details

CWE(s)

Affected Products

dronecode
px4 drone autopilot
1.12.0 — 1.16.0

CVEs Like This One

CVE-2026-26741Same product: Dronecode Px4 Drone Autopilot
CVE-2024-40427Same product: Dronecode Px4 Drone Autopilot
CVE-2026-32706Same product: Dronecode Px4 Drone Autopilot
CVE-2026-32708Same product: Dronecode Px4 Drone Autopilot
CVE-2026-41352Shared CWE-862
CVE-2025-59461Shared CWE-862
CVE-2026-40502Shared CWE-862
CVE-2025-15330Shared CWE-862
CVE-2026-0509Shared CWE-862
CVE-2026-2038Shared CWE-862

References