Description
The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is "it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/tradr-project/tf_remapper_cpp/issues/1 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T15:10:59.414Z
Reserved: 2023-01-04T00:00:00.000Z
Link: CVE-2022-48217
Updated: 2024-08-03T15:10:59.414Z
Status : Modified
Published: 2023-01-04T19:15:09.517
Modified: 2024-11-21T07:32:58.693
Link: CVE-2022-48217
No data.
OpenCVE Enrichment
No data.
Weaknesses