{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T09:38:33.558","vulnerabilities":[{"cve":{"id":"CVE-2024-39835","sourceIdentifier":"security@ubuntu.com","published":"2025-07-17T20:15:27.400","lastModified":"2025-08-26T17:51:58.870","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code."},{"lang":"es","value":"Se ha identificado una vulnerabilidad de inyección de código en la herramienta de línea de comandos \"roslaunch\" del Robot Operating System (ROS), que afecta a las distribuciones de ROS Noetic Ninjemys y anteriores. La vulnerabilidad surge del uso del método eval() para procesar valores de parámetros no saneados, proporcionados por el usuario, dentro del mecanismo de argumentos de sustitución, que roslaunch evalúa antes de lanzar un nodo. Esta falla permite a los atacantes manipular y ejecutar código Python arbitrario. "}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-95"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:indigo_igloo:*:*:*:*:*:*:*","matchCriteriaId":"0673568E-BE13-4D10-9E7B-57B6D38850B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:kinetic_kame:*:*:*:*:*:*:*","matchCriteriaId":"429E39E2-7812-44F3-B3DB-D82561432B88"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:melodic_morenia:*:*:*:*:*:*:*","matchCriteriaId":"C319FA37-A18B-4706-9B29-827BA81CB5B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:openrobotics:robot_operating_system:noetic_ninjemys:*:*:*:*:*:*:*","matchCriteriaId":"2F466D1C-796D-4857-BEDF-FA600DF47669"}]}]}],"references":[{"url":"https://www.ros.org/blog/noetic-eol/","source":"security@ubuntu.com","tags":["Product"]}]}}]}