Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dronecode
Dronecode px4 Drone Autopilot |
|
| CPEs | cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:* cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:* cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:* |
|
| Vendors & Products |
Dronecode
Dronecode px4 Drone Autopilot |
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Px4
Px4 px4-autopilot |
|
| Vendors & Products |
Px4
Px4 px4-autopilot |
Fri, 13 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a heap-use-after-free is detected in the MavlinkShell::available() function. The issue is caused by a race condition between the MAVLink receiver thread (which handles shell creation/destruction) and the telemetry sender thread (which polls the shell for available output). The issue is remotely triggerable via MAVLink SERIAL_CONTROL messages (ID 126), which can be sent by an external ground station or automated script. This vulnerability is fixed in 1.17.0-rc1. | |
| Title | PX4 autopilot has a heap Use-After-Free in MavlinkShell::available() via SERIAL_CONTROL Race Condition | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T20:22:43.754Z
Reserved: 2026-03-13T15:02:00.625Z
Link: CVE-2026-32724
Updated: 2026-03-16T20:20:41.823Z
Status : Analyzed
Published: 2026-03-16T14:19:43.203
Modified: 2026-03-16T18:33:49.930
Link: CVE-2026-32724
No data.
OpenCVE Enrichment
Updated: 2026-03-23T13:39:12Z