The MAVLink communication protocol does not require cryptographic
authentication by default. When MAVLink 2.0 message signing is not
enabled, any message -- including SERIAL_CONTROL, which provides
interactive shell access -- can be sent by an unauthenticated party with
access to the MAVLink interface. PX4 provides MAVLink 2.0 message
signing as the cryptographic authentication mechanism for all MAVLink
communication. When signing is enabled, unsigned messages are rejected
at the protocol level.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Px4 autopilot
|
|
| CPEs | cpe:2.3:a:px4:autopilot:1.16.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Px4 autopilot
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Px4
Px4 px4-autopilot |
|
| Vendors & Products |
Px4
Px4 px4-autopilot |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MAVLink communication protocol does not require cryptographic authentication by default. When MAVLink 2.0 message signing is not enabled, any message -- including SERIAL_CONTROL, which provides interactive shell access -- can be sent by an unauthenticated party with access to the MAVLink interface. PX4 provides MAVLink 2.0 message signing as the cryptographic authentication mechanism for all MAVLink communication. When signing is enabled, unsigned messages are rejected at the protocol level. | |
| Title | PX4 Autopilot Missing authentication for critical function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2026-03-31T20:20:06.506Z
Updated: 2026-03-31T20:36:09.044Z
Reserved: 2026-01-28T22:27:22.970Z
Link: CVE-2026-1579
Updated: 2026-03-31T20:36:03.968Z
Status : Analyzed
Published: 2026-03-31T21:16:27.897
Modified: 2026-04-07T15:33:30.363
Link: CVE-2026-1579
No data.