PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, A logic error in the PX4 Autopilot MAVLink FTP session validation uses incorrect boolean logic (&& instead of ||), allowing BurstReadFile and WriteFile operations to proceed with invalid sessions or closed file descriptors. This enables an unauthenticated attacker to put the FTP subsystem into an inconsistent state, trigger operations on invalid file descriptors, and bypass session isolation checks. This vulnerability is fixed in 1.17.0-rc2.
References
| Link | Resource |
|---|---|
| https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-pp2c-jr5g-6f2m | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-16 14:19
Updated : 2026-03-16 19:00
NVD link : CVE-2026-32713
Mitre link : CVE-2026-32713
CVE.ORG link : CVE-2026-32713
JSON object : View
Products Affected
dronecode
- px4_drone_autopilot
CWE
CWE-670
Always-Incorrect Control Flow Implementation
