CVE-2026-32708
Published: 16 March 2026
Summary
CVE-2026-32708 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dronecode Px4 Drone Autopilot. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires bounds checking and validation of incoming payload lengths to prevent unbounded stack VLA allocation from oversized Zenoh messages.
Implements memory protection mechanisms like stack canaries or ASLR to detect and prevent exploitation or crashes from stack overflows.
Ensures timely identification, reporting, and patching of the buffer overflow flaw as fixed in PX4 1.17.0-rc2.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow with local attack vector and low privileges leading to high confidentiality/integrity/availability impact directly enables local exploitation for privilege escalation (T1068). Remote publisher mention and crash outcome introduce minor uncertainty on exact post-exploit impact.
NVD Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force…
more
an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2.
Deeper analysisAI
CVE-2026-32708 is a stack-based buffer overflow vulnerability (CWE-121) in PX4 Autopilot, an open-source flight control solution for drones. In versions prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack variable-length array (VLA) directly based on the incoming payload length without performing bounds checks. This flaw allows processing of oversized payloads to trigger unbounded stack allocation and copying.
A remote Zenoh publisher can exploit the vulnerability by sending an oversized fragmented message, leading to a stack overflow and crash of the Zenoh bridge task. According to the CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), exploitation requires local access, low attack complexity, and low privileges, but results in high impacts to confidentiality, integrity, and availability.
The vulnerability is addressed in PX4 Autopilot version 1.17.0-rc2. The official security advisory on GitHub (GHSA-69g4-hcqf-j45p) provides details on the fix and recommends updating to the patched release for mitigation.
Details
- CWE(s)