{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:22:41.449","vulnerabilities":[{"cve":{"id":"CVE-2024-39289","sourceIdentifier":"security@ubuntu.com","published":"2025-07-17T20:15:27.230","lastModified":"2025-08-26T17:51:50.470","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code."},{"lang":"es","value":"Se ha descubierto una vulnerabilidad de ejecución de código en la herramienta 'rosparam' del Robot Operating System (ROS), que afecta a las distribuciones de ROS Noetic Ninjemys y anteriores. La vulnerabilidad se debe al uso de la función eval() para procesar valores de parámetros no depurados, proporcionados por el usuario, mediante convertidores especiales para representaciones de ángulos en radianes. Esta falla permitía a los atacantes manipular y ejecutar código Python arbitrario."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-95"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:indigo_igloo:*:*:*:*:*:*:*","matchCriteriaId":"0673568E-BE13-4D10-9E7B-57B6D38850B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:kinetic_kame:*:*:*:*:*:*:*","matchCriteriaId":"429E39E2-7812-44F3-B3DB-D82561432B88"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:melodic_morenia:*:*:*:*:*:*:*","matchCriteriaId":"C319FA37-A18B-4706-9B29-827BA81CB5B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:noetic_ninjemys:*:*:*:*:*:*:*","matchCriteriaId":"2F466D1C-796D-4857-BEDF-FA600DF47669"}]}]}],"references":[{"url":"https://www.ros.org/blog/noetic-eol/","source":"security@ubuntu.com","tags":["Product"]}]}}]}