{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:14:35.580","vulnerabilities":[{"cve":{"id":"CVE-2023-47625","sourceIdentifier":"security-advisories@github.com","published":"2023-11-13T21:15:08.513","lastModified":"2024-11-21T08:30:33.243","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PX4 autopilot is a flight control solution for drones. In affected versions a global buffer overflow vulnerability exists in the CrsfParser_TryParseCrsfPacket function in /src/drivers/rc/crsf_rc/CrsfParser.cpp:298 due to the invalid size check. A malicious user may create an RC packet remotely and that packet goes into the device where the _rcs_buf reads. The global buffer overflow vulnerability will be triggered and the drone can behave unexpectedly. This issue has been addressed in version 1.14.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"PX4 autopilot, es una solución de control de vuelo para drones. En las versiones afectadas existe una vulnerabilidad de desbordamiento del búfer global en la función CrsfParser_TryParseCrsfPacket en /src/drivers/rc/crsf_rc/CrsfParser.cpp:298 debido a una verificación de tamaño no válido. Un usuario malintencionado puede crear un paquete RC de forma remota y ese paquete ingresa al dispositivo donde lee _rcs_buf. Se activará la vulnerabilidad de desbordamiento del búfer global y el dron puede comportarse inesperadamente. Este problema se solucionó en la versión 1.14.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":2.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.4,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dronecode:px4_drone_autopilot:1.14.0:rc2:*:*:*:*:*:*","matchCriteriaId":"1E3305CD-31A4-4A5B-A75C-338B5D030101"}]}]}],"references":[{"url":"https://github.com/PX4/PX4-Autopilot/commit/d1fcd39a44e6312582c6ab02b0d5ee2599fb55aa","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/PX4/PX4-Autopilot/commit/d1fcd39a44e6312582c6ab02b0d5ee2599fb55aa","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}