dronecode CVE Vulnerabilities & Metrics

Focus on dronecode vulnerabilities and metrics.

Last updated: 01 Aug 2025, 22:25 UTC

About dronecode Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with dronecode. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total dronecode CVEs: 15
Earliest CVE date: 03 Jul 2020, 15:15 UTC
Latest CVE date: 07 Jan 2025, 19:15 UTC

Latest CVE reference: CVE-2024-40427

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -88.89%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -88.89%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical dronecode CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.33

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 1
7.0-8.9 2
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS dronecode CVEs

These are the five CVEs with the highest CVSS scores for dronecode, sorted by severity first and recency.

All CVEs for dronecode

CVE-2024-40427 dronecode vulnerability CVSS: 0 07 Jan 2025, 19:15 UTC

Stack Buffer Overflow in PX4-Autopilot v1.14.3, which allows attackers to execute commands to exploit this vulnerability and cause the program to refuse to execute

CVE-2024-38952 dronecode vulnerability CVSS: 0 25 Jun 2024, 14:15 UTC

PX4-Autopilot v1.14.3 was discovered to contain a buffer overflow via the topic_name parameter at /logger/logged_topics.cpp.

CVE-2024-38951 dronecode vulnerability CVSS: 0 25 Jun 2024, 14:15 UTC

A buffer overflow in PX4-Autopilot v1.12.3 allows attackers to cause a Denial of Service (DoS) via a crafted MavLink message.

CVE-2024-30800 dronecode vulnerability CVSS: 0 23 Apr 2024, 13:15 UTC

PX4 Autopilot v.1.14 allows an attacker to fly the drone into no-fly zones by breaching the geofence using flaws in the function.

CVE-2024-30799 dronecode vulnerability CVSS: 0 22 Apr 2024, 01:15 UTC

An issue in PX4 Autopilot v1.14 and before allows a remote attacker to execute arbitrary code and cause a denial of service via the Breach Return Point function.

CVE-2024-29460 dronecode vulnerability CVSS: 0 10 Apr 2024, 21:15 UTC

An issue in PX4 Autopilot v.1.14.0 allows an attacker to manipulate the flight path allowing for crashes of the drone via the home point location of the mission_block.cpp component.

CVE-2024-24255 dronecode vulnerability CVSS: 0 06 Feb 2024, 23:15 UTC

A Race Condition discovered in geofence.cpp and mission_feasibility_checker.cpp in PX4 Autopilot 1.14 and earlier allows attackers to send drones on unintended missions.

CVE-2024-24254 dronecode vulnerability CVSS: 0 06 Feb 2024, 22:16 UTC

PX4 Autopilot 1.14 and earlier, due to the lack of synchronization mechanism for loading geofence data, has a Race Condition vulnerability in the geofence.cpp and mission_feasibility_checker.cpp. This will result in the drone uploading overlapping geofences and mission routes.

CVE-2023-47625 dronecode vulnerability CVSS: 0 13 Nov 2023, 21:15 UTC

PX4 autopilot is a flight control solution for drones. In affected versions a global buffer overflow vulnerability exists in the CrsfParser_TryParseCrsfPacket function in /src/drivers/rc/crsf_rc/CrsfParser.cpp:298 due to the invalid size check. A malicious user may create an RC packet remotely and that packet goes into the device where the _rcs_buf reads. The global buffer overflow vulnerability will be triggered and the drone can behave unexpectedly. This issue has been addressed in version 1.14.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-46256 dronecode vulnerability CVSS: 0 31 Oct 2023, 16:15 UTC

PX4-Autopilot provides PX4 flight control solution for drones. In versions 1.14.0-rc1 and prior, PX4-Autopilot has a heap buffer overflow vulnerability in the parser function due to the absence of `parserbuf_index` value checking. A malfunction of the sensor device can cause a heap buffer overflow with leading unexpected drone behavior. Malicious applications can exploit the vulnerability even if device sensor malfunction does not occur. Up to the maximum value of an `unsigned int`, bytes sized data can be written to the heap memory area. As of time of publication, no fixed version is available.

CVE-2021-46896 dronecode vulnerability CVSS: 0 06 Jul 2023, 14:15 UTC

Buffer Overflow vulnerability in PX4-Autopilot allows attackers to cause a denial of service via handler function handling msgid 332.

CVE-2021-34125 dronecode vulnerability CVSS: 0 09 Mar 2023, 23:15 UTC

An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands.

CVE-2020-10283 dronecode vulnerability CVSS: 7.5 20 Aug 2020, 09:15 UTC

The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.

CVE-2020-10282 dronecode vulnerability CVSS: 7.5 03 Jul 2020, 15:15 UTC

The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized access, PITM attacks and more. According to literature, version 2.0 optionally allows for package signing which mitigates this flaw. Another source mentions that MAVLink 2.0 only provides a simple authentication system based on HMAC. This implies that the flying system overall should add the same symmetric key into all devices of network. If not the case, this may cause a security issue, that if one of the devices and its symmetric key are compromised, the whole authentication system is not reliable.

CVE-2020-10281 dronecode vulnerability CVSS: 5.0 03 Jul 2020, 15:15 UTC

This vulnerability applies to the Micro Air Vehicle Link (MAVLink) protocol and allows a remote attacker to gain access to sensitive information provided it has access to the communication medium. MAVLink is a header-based protocol that does not perform encryption to improve transfer (and reception speed) and efficiency by design. The increasing popularity of the protocol (used accross different autopilots) has led to its use in wired and wireless mediums through insecure communication channels exposing sensitive information to a remote attacker with ability to intercept network traffic.