<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-32707 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32707/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 11:12:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32707/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dronecode PX4-Autopilot tattu_can Stack Buffer Overflow (CVE-2026-32707)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-dronecode-px4-dos/</link><pubDate>Fri, 08 May 2026 11:12:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-dronecode-px4-dos/</guid><description>A stack-based buffer overflow vulnerability exists in the `tattu_can` driver of Dronecode PX4-Autopilot versions 1.17.0-rc1 and earlier; by injecting specially crafted CAN frames, an attacker can trigger an unbounded memcpy operation, leading to a stack corruption and subsequent crash of the PX4 process, resulting in a denial of service.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, CVE-2026-32707, was discovered in the <code>tattu_can</code> driver of the Dronecode PX4-Autopilot flight controller firmware. This vulnerability affects versions up to and including 1.17.0-rc1. The flaw stems from an unbounded memcpy() operation within the multi-frame message assembly routine of the <code>Tattu12SBatteryMessage</code> structure. Successful exploitation allows an attacker capable of injecting CAN frames into the bus to trigger a stack corruption, causing the PX4 process to crash, leading to a denial-of-service condition. The vulnerability has been patched in PX4-Autopilot version 1.17.0-rc2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker injects a CAN frame into the CAN bus with DLC=8 and the last byte of the data set to 0x80. This signals the start of a new <code>Tattu12SBatteryMessage</code>.</li>
<li>The <code>tattu_can</code> driver receives the start-of-transfer frame.</li>
<li>The driver allocates a 48-byte buffer on the stack (<code>tattu_message</code>). The first 5 bytes from the start frame are copied into the stack buffer.</li>
<li>The attacker sends seven subsequent CAN frames, each with DLC=8, containing the overflow payload (7 bytes of data per frame are copied).</li>
<li>The <code>tattu_can</code> driver processes each overflow frame, copying 7 bytes from each frame into the <code>tattu_message</code> buffer using <code>memcpy()</code>, incrementing the offset by 7 bytes after each copy.</li>
<li>After processing the seventh overflow frame, the cumulative offset exceeds the 48-byte buffer size.</li>
<li>The attacker sends a final overflow CAN frame, which triggers the last <code>memcpy()</code> operation, writing past the boundaries of the buffer on the stack.</li>
<li>The stack corruption leads to a segmentation fault or hard fault, causing the PX4 process to crash and resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition on the PX4-Autopilot system. On a real flight controller, this can result in a loss of control of the drone, potentially causing it to crash. The vulnerability affects systems running PX4-Autopilot versions up to and including 1.17.0-rc1 with the <code>tattu_can</code> driver enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Update PX4-Autopilot to version 1.17.0-rc2 or later, as specified in the &ldquo;Vulnerable &amp; Fixed Versions&rdquo; section of this brief.</li>
<li>Disable the <code>tattu_can</code> driver if it is not required by running <code>tattu_can stop</code> or removing it from the build, as mentioned in the &ldquo;Mitigation&rdquo; section.</li>
<li>Apply the patch manually, incorporating the bounds check added in commit <code>3f04b7a</code>, as detailed in the &ldquo;Mitigation&rdquo; section.</li>
<li>Monitor CAN bus traffic for suspicious frames with DLC=8 and a last byte of 0x80, followed by multiple overflow frames as described in the attack chain; implement rules to detect anomalous CAN traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>stack buffer overflow</category><category>denial of service</category><category>CVE-2026-32707</category></item></channel></rss>