CVE-2026-1579 PUBLISHED

PX4 Autopilot Missing authentication for critical function

Assigner: icscert
Reserved: 28.01.2026 Published: 31.03.2026 Updated: 31.03.2026

The MAVLink communication protocol does not require cryptographic authentication by default. When MAVLink 2.0 message signing is not enabled, any message -- including SERIAL_CONTROL, which provides interactive shell access -- can be sent by an unauthenticated party with access to the MAVLink interface. PX4 provides MAVLink 2.0 message signing as the cryptographic authentication mechanism for all MAVLink communication. When signing is enabled, unsigned messages are rejected at the protocol level.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor PX4
Product Autopilot
Versions Default: unaffected
  • Version v1.16.0 SITL is affected

Solutions

PX4 recommends enabling MAVLink 2.0 message signing as the authentication mechanism for all non‑USB communication links. PX4 has published a security hardening guide for integrators and manufacturers at  https://docs.px4.io/main/en/mavlink/security_hardening

Message signing configuration documentation can be found at  https://docs.px4.io/main/en/mavlink/message_signing

Credits

  • Dolev Aviv of Cyviation reported this vulnerability to CISA. finder

References

Problem Types

  • CWE-306 CWE