Cyber Posture

CVE-2026-32708

HighPublic PoC

Published: 16 March 2026

Published
16 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32708 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dronecode Px4 Drone Autopilot. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires bounds checking and validation of incoming payload lengths to prevent unbounded stack VLA allocation from oversized Zenoh messages.

prevent

Implements memory protection mechanisms like stack canaries or ASLR to detect and prevent exploitation or crashes from stack overflows.

preventrecover

Ensures timely identification, reporting, and patching of the buffer overflow flaw as fixed in PX4 1.17.0-rc2.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Stack-based buffer overflow with local attack vector and low privileges leading to high confidentiality/integrity/availability impact directly enables local exploitation for privilege escalation (T1068). Remote publisher mention and crash outcome introduce minor uncertainty on exact post-exploit impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force…

more

an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2.

Deeper analysisAI

CVE-2026-32708 is a stack-based buffer overflow vulnerability (CWE-121) in PX4 Autopilot, an open-source flight control solution for drones. In versions prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack variable-length array (VLA) directly based on the incoming payload length without performing bounds checks. This flaw allows processing of oversized payloads to trigger unbounded stack allocation and copying.

A remote Zenoh publisher can exploit the vulnerability by sending an oversized fragmented message, leading to a stack overflow and crash of the Zenoh bridge task. According to the CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), exploitation requires local access, low attack complexity, and low privileges, but results in high impacts to confidentiality, integrity, and availability.

The vulnerability is addressed in PX4 Autopilot version 1.17.0-rc2. The official security advisory on GitHub (GHSA-69g4-hcqf-j45p) provides details on the fix and recommends updating to the patched release for mitigation.

Details

CWE(s)

Affected Products

dronecode
px4 drone autopilot
1.17.0 · ≤ 1.17.0

CVEs Like This One

CVE-2026-26741Same product: Dronecode Px4 Drone Autopilot
CVE-2024-40427Same product: Dronecode Px4 Drone Autopilot
CVE-2026-26742Same product: Dronecode Px4 Drone Autopilot
CVE-2026-32706Same product: Dronecode Px4 Drone Autopilot
CVE-2025-70616Shared CWE-121
CVE-2026-39457Shared CWE-121
CVE-2026-24882Shared CWE-121
CVE-2026-21224Shared CWE-121
CVE-2025-47391Shared CWE-121
CVE-2025-24928Shared CWE-121

References