VulnerabilitiesCRITICAL

PX4 Autopilot Vulnerability - Attackers Can Control Drones

Featured image for PX4 Autopilot Vulnerability - Attackers Can Control Drones
CSCyber Security News
CVE-2026-1579PX4 AutopilotCISAdrone securityDolev Aviv
🎯

Basically, a flaw in drone software lets hackers take control of the drones.

Quick Summary

A critical vulnerability in PX4 Autopilot software allows attackers to gain full control over drones. This flaw poses serious risks to critical infrastructure. CISA has issued urgent recommendations for operators to secure their systems.

What Happened

A critical vulnerability has been discovered in the widely used PX4 Autopilot software, which is essential for controlling drones and autonomous vehicles. The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on March 31, 2026, alerting operators to this severe flaw. The vulnerability, tracked as CVE-2026-1579, poses a significant threat to critical infrastructure, particularly in sectors like Transportation Systems, Emergency Services, and the Defense Industrial Base.

The Flaw

The vulnerability has a near-maximum CVSS v3 score of 9.8, categorizing it as critical. The core issue arises from the lack of an authentication mechanism for a crucial function within the software. If an attacker gains access to the drone’s MAVLink interface, the primary communication protocol for commands and telemetry, they can exploit this flaw to bypass security checks. This allows them to execute arbitrary commands on the drone’s operating system without any cryptographic authentication.

What's at Risk

Once an attacker connects to the drone, they can:

  • Alter flight paths
  • Force crashes
  • Intercept sensitive data
  • Lock legitimate operators out of the system This level of control poses a serious risk not only to individual drone operators but also to public safety and national security given the critical infrastructure involved.

Patch Status

Currently, there is no known public exploitation of this vulnerability. However, the specific version affected is PX4 Autopilot v1.16.0_SITL_latest_stable. Security researcher Dolev Aviv from Cyviation discovered and reported this flaw to CISA.

Immediate Actions

To mitigate risks associated with this vulnerability, CISA recommends several defensive measures:

  • Minimize network exposure for all control system devices, ensuring they are not directly accessible from the internet.
  • Place control system networks and remote devices behind strict firewalls, isolating them from corporate networks.
  • Use secure, fully updated Virtual Private Networks (VPNs) for remote access when necessary.
  • Conduct a thorough risk assessment before implementing new defensive measures to avoid operational disruptions.
  • Train staff to resist social engineering attacks, as attackers often use phishing to gain initial access.
  • Continuously monitor CISA alerts and apply vendor patches as they become available.

By following these recommendations, organizations can better protect their drone fleets and critical infrastructure from potential exploitation.

🔒 Pro insight: The lack of authentication in drone control systems highlights a significant security gap, necessitating immediate attention from operators to prevent potential exploitation.

Original article from

CSCyber Security News· Abinaya
Read Full Article

Related Pings

HIGHVulnerabilities

TP-Link Vulnerabilities - Attackers Can Crash Routers

TP-Link's Tapo C520WS cameras have critical vulnerabilities that can lead to device crashes. Users must update their firmware immediately to avoid security risks and unauthorized access. Don't leave your surveillance equipment exposed!

Cyber Security News·
HIGHVulnerabilities

React2Shell Vulnerability - Hackers Compromise 700+ Hosts

Hackers have exploited the React2Shell vulnerability, compromising over 700 Next.js servers. This breach has led to significant data theft, impacting sensitive information. Organizations must act quickly to secure their applications and prevent further damage.

Cyber Security News·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

Local Privilege Escalation - Vulnerability in Vienna Assistant

A vulnerability in Vienna Assistant for MacOS allows attackers to escalate privileges and execute commands. Users are urged to contact the vendor for a fix. This flaw poses a high risk to system security.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·
HIGHVulnerabilities

Broken Access Control - High Risk in Open WebUI Discovered

A serious vulnerability has been found in Open WebUI, allowing low-privileged users to access sensitive data. This flaw, CVE-2026-34222, poses a high risk. Users must update to the latest version to secure their systems.

Full Disclosure·