openrobotics CVE Vulnerabilities & Metrics

Focus on openrobotics vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About openrobotics Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with openrobotics. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total openrobotics CVEs: 22
Earliest CVE date: 20 Aug 2020, 08:15 UTC
Latest CVE date: 06 Dec 2024, 22:15 UTC

Latest CVE reference: CVE-2024-44856

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 21

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical openrobotics CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.3

Max CVSS: 6.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 21
4.0-6.9 1
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS openrobotics CVEs

These are the five CVEs with the highest CVSS scores for openrobotics, sorted by severity first and recency.

All CVEs for openrobotics

CVE-2024-44856 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_smac_planner().

CVE-2024-44855 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_navfn_planner().

CVE-2024-44854 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component smoothPlan().

CVE-2024-44853 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl().

CVE-2024-44852 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a segmentation violation via the component theta_star::ThetaStar::isUnsafeToPlan().

CVE-2024-41650 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_costmap_2d.

CVE-2024-41649 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the executor_thread_.

CVE-2024-41648 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_regulated_pure_pursuit_controller.

CVE-2024-41647 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_mppi_controller.

CVE-2024-41646 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller.

CVE-2024-41645 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2__amcl.

CVE-2024-41644 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via the dyn_param_handler_ component.

CVE-2024-38927 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter `/amcl do_beamskip`.

CVE-2024-38926 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter `/amcl z_short`.

CVE-2024-38925 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_max` .

CVE-2024-38924 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter`/amcl laser_model_type` .

CVE-2024-38923 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter`/amcl odom_frame_id` .

CVE-2024-38922 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose.

CVE-2024-38921 openrobotics vulnerability CVSS: 0 06 Dec 2024, 22:15 UTC

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` .

CVE-2024-30962 openrobotics vulnerability CVSS: 0 05 Dec 2024, 23:15 UTC

Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process

CVE-2024-30961 openrobotics vulnerability CVSS: 0 05 Dec 2024, 23:15 UTC

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the error-thrown mechanism in nav2_bt_navigator.

CVE-2020-10289 openrobotics vulnerability CVSS: 6.5 20 Aug 2020, 08:15 UTC

Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug.