This critical flaw could allow malicious actors to completely take over unmanned aerial vehicles (UAVs) and drones deployed across vital infrastructure sectors worldwide.
Tracked as CVE-2026-1579, the security flaw carries a near-maximum Common Vulnerability Scoring System (CVSS) v3.1 score of 9.8 out of 10.
Classified under CWE-306, the vulnerability stems from a “Missing Authentication for Critical Function” error within the drone’s flight software.
CISA formally published the advisory under identifier ICSA-26-090-02 on March 31, 2026.c
PX4 Autopilot is a widely adopted open-source flight control software used globally to manage drones and other autonomous vehicles.
The vulnerability exists in how the software handles communication through the MAVLink interface, a messaging protocol used to transmit commands and telemetry data between drones and ground control stations.
According to the CISA advisory, the MAVLink communication protocol does not require cryptographic authentication by default.
This means that when MAVLink 2.0 message signing is not enabled, any message including the SERIAL_CONTROL A command, which provides interactive shell access, can be sent by an unauthenticated party with access to the MAVLink interface.
An attacker who can reach that interface can issue arbitrary shell commands without needing a password or security key, effectively hijacking full control of the flight controller.
The vulnerability specifically impacts PX4 Autopilot version v1.16.0_SITL_latest_stable.
The Switzerland-headquartered PX4 Autopilot system is deployed globally, with CISA confirming that the affected critical infrastructure sectors include:
A successful remote drone takeover in these environments could lead to stolen surveillance data, disrupted emergency response efforts, or compromised defense operations.
The critical flaw was discovered and responsibly reported to CISA by security researcher Dolev Aviv from aviation cybersecurity firm Cyviation.
Cyviation specializes in proactive intelligence and monitoring solutions targeting cyber threats in aviation communication systems.
CISA and PX4 urge all operators and organizations to take immediate defensive action:
As of publication, no known public exploitation specifically targeting this vulnerability has been reported to CISA.
However, given the critical CVSS score and the sensitive sectors involved, drone operators relying on the PX4 ecosystem should treat this as an urgent remediation priority.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Critical PX4 Autopilot Flaw Lets Hackers Take Control of Drones appeared first on Cyber Security News.
An Evansville, Indiana woman has been arrested on multiple neglect charges after police say two…
Ever felt like there just aren’t enough hours in your day? I used to drown…
AI agents are autonomous operators, accessing applications, retrieving data, chaining tools, and executing tasks across…
Most AI transformation advice tells leaders what to do. Build the data infrastructure, invest in…
Ever felt like there just aren’t enough hours in your day? I used to drown…
AI agents are autonomous operators, accessing applications, retrieving data, chaining tools, and executing tasks across…
This website uses cookies.