ROS# Path Traversal Vulnerability (CVE-2026-41551)
ROS# versions prior to V2.2.2 are vulnerable to path traversal (CVE-2026-41551) due to insufficient sanitization of user input, potentially enabling remote attackers to read arbitrary files.
A path traversal vulnerability, identified as CVE-2026-41551, affects ROS# versions prior to V2.2.2. The vulnerability stems from a lack of proper sanitization of user input, potentially allowing a remote attacker to read arbitrary files on the affected system. This issue was reported by Siemens AG. This vulnerability is especially critical because it can lead to unauthorized access of sensitive information on systems running ROS#, which are commonly used in robotics and automation applications. Successful exploitation bypasses intended security restrictions and compromises data confidentiality.
Attack Chain
- The attacker identifies a ROS# instance running a version prior to 2.2.2.
- The attacker crafts a malicious HTTP request containing a path traversal sequence (e.g., “../../../etc/passwd”) within a user-supplied input field.
- The malicious request is sent to a vulnerable endpoint within the ROS# application.
- The ROS# application processes the request without properly sanitizing the path traversal sequence.
- The application attempts to access a file based on the manipulated path.
- Due to the path traversal, the application reads a file outside of the intended directory (e.g., /etc/passwd).
- The attacker receives the contents of the arbitrary file in the HTTP response.
- The attacker gains unauthorized access to sensitive information, potentially leading to further exploitation or system compromise.
Impact
Successful exploitation of CVE-2026-41551 can allow an attacker to read arbitrary files on the affected system. This can lead to the disclosure of sensitive information such as configuration files, credentials, or other confidential data. The CVSS v3.1 base score for this vulnerability is 9.1, highlighting the high risk associated with this issue. Affected sectors include robotics, automation, and industrial control systems where ROS# is used.
Recommendation
- Upgrade to ROS# version V2.2.2 or later to remediate CVE-2026-41551 by patching the vulnerable code.
- Deploy the Sigma rules provided in this brief to detect path traversal attempts targeting ROS# installations, monitoring for suspicious characters in web requests.
- Implement input validation and sanitization measures to prevent path traversal vulnerabilities in ROS# applications. Specifically, filter “..”, “.” and other traversal characters from user input.
Detection coverage 2
Detects CVE-2026-41551 Attempt — ROS# Path Traversal
highDetects CVE-2026-41551 exploitation attempt — Path traversal in ROS# via HTTP request with directory traversal sequences.
Detects CVE-2026-41551 Attempt — ROS# Encoded Path Traversal
highDetects CVE-2026-41551 exploitation attempt — Path traversal in ROS# via HTTP request with URL-encoded directory traversal sequences.
Detection queries are available on the platform. Get full rules →