The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26741

CVE-2026-26741: PX4 Autopilot Privilege Escalation Flaw

CVE-2026-26741 is a privilege escalation flaw in Dronecode PX4 Autopilot affecting versions 1.12.x through 1.15.x. The mode switching logic flaw can cause uncontrolled drone ascent and property damage. This post covers technical details, affected versions, impact, and mitigation steps.

Published: March 13, 2026

CVE-2026-26741 Overview

CVE-2026-26741 is a logic flaw vulnerability affecting PX4 Autopilot versions 1.12.x through 1.15.x. The vulnerability exists in the mode switching mechanism and is classified as Missing Authorization (CWE-862). When transitioning from Auto mode to Manual mode while the drone is in the "ARMED" state—specifically after landing but before automatic disarm triggered by the COM_DISARM_LAND parameter—the system fails to perform a throttle threshold safety check for the physical throttle stick. This missing safety check can result in complete loss of control, rapid uncontrolled ascent (flyaway), and potential property damage.

Critical Impact

Exploitation of this vulnerability can cause drones to experience uncontrolled flyaway behavior, resulting in loss of control and property damage. The flaw affects the critical mode transition safety mechanism in autonomous drone systems.

Affected Products

  • Dronecode PX4 Drone Autopilot versions 1.12.x through 1.15.x
  • Systems using PX4 Autopilot with mode switching between Auto and Manual modes
  • Drone configurations utilizing the COM_DISARM_LAND automatic disarm parameter

Discovery Timeline

  • 2026-03-10 - CVE-2026-26741 published to NVD
  • 2026-03-12 - Last updated in NVD database

Technical Details for CVE-2026-26741

Vulnerability Analysis

This vulnerability represents a critical safety oversight in the PX4 Autopilot flight control system's mode transition logic. The root cause stems from missing authorization checks (CWE-862) during state transitions, specifically the absence of throttle stick position validation when switching between autonomous and manual control modes.

In normal operation, when a drone lands in Auto mode, the COM_DISARM_LAND parameter triggers an automatic disarm sequence after a configurable delay. However, if an operator switches to Manual mode during this vulnerable window (while the aircraft remains ARMED post-landing), the flight controller immediately passes throttle commands to the motors without first verifying the throttle stick is in a safe (low) position.

The attack requires adjacent network access to the drone's control systems, allowing an attacker who can inject mode switching commands to trigger this unsafe state transition. The vulnerability affects both integrity and availability, potentially causing complete loss of aircraft control.

Root Cause

The root cause is a missing safety check in the mode switching state machine. The PX4 flight stack lacks proper validation of manual control input positions before transferring authority from the autopilot to the pilot's physical controls. When transitioning from Auto to Manual mode, the system should verify that the throttle stick is below a safe threshold before enabling manual control. This verification step is absent in affected versions, creating a dangerous gap in the safety architecture where the drone can immediately respond to whatever throttle position the stick happens to be in at the moment of transition.

Attack Vector

The attack vector is classified as Adjacent Network, meaning an attacker must be within communication range of the drone's control link. Exploitation requires the ability to send mode switching commands to the aircraft while it is in the ARMED state post-landing. The attack scenario unfolds as follows:

The attacker monitors for a drone completing an autonomous landing sequence. During the window between touchdown and automatic disarm (controlled by COM_DISARM_LAND), the attacker transmits a mode switch command from Auto to Manual. If the operator's throttle stick is not at the minimum position, the drone immediately applies the current throttle setting, potentially causing rapid uncontrolled ascent. No user interaction is required beyond the attacker's ability to send the malicious command, and no authentication is needed to exploit this flaw.

Detection Methods for CVE-2026-26741

Indicators of Compromise

  • Unexpected mode transitions from Auto to Manual mode during the post-landing ARMED state
  • Telemetry logs showing throttle commands immediately following mode switches without corresponding safety checks
  • Flight logs indicating rapid altitude increases following landing sequences
  • Anomalous control link communications during the disarm delay window

Detection Strategies

  • Monitor flight controller logs for mode transition events occurring between landing detection and disarm
  • Implement telemetry analysis to flag Auto-to-Manual transitions while COM_DISARM_LAND timer is active
  • Deploy network intrusion detection systems on control link frequencies to identify unauthorized command injection
  • Review flight logs for throttle command spikes immediately following mode switches

Monitoring Recommendations

  • Enable verbose logging for mode state machine transitions in PX4 Autopilot
  • Configure ground control station alerts for unexpected mode changes during post-landing sequences
  • Implement real-time telemetry monitoring for throttle position validation during mode transitions
  • Establish baseline flight profiles to detect anomalous behavior patterns indicative of exploitation

How to Mitigate CVE-2026-26741

Immediate Actions Required

  • Review the GitHub Vulnerability Report for detailed technical information
  • Reduce the COM_DISARM_LAND parameter to minimize the vulnerable window between landing and automatic disarm
  • Establish operational procedures requiring throttle stick verification before any mode transitions
  • Consider restricting mode switching capabilities during the ARMED post-landing state until a patch is available

Patch Information

Organizations running affected PX4 Autopilot versions (1.12.x through 1.15.x) should monitor the official PX4 project repositories for security updates addressing this logic flaw. Review the GitHub Vulnerability Report for the latest remediation guidance and subscribe to PX4 security announcements for patch notifications.

Workarounds

  • Configure COM_DISARM_LAND to the shortest practical value to minimize the vulnerable time window
  • Implement operational controls requiring manual throttle verification before mode switching
  • Disable Auto-to-Manual mode transitions during the ARMED state through custom parameter configurations
  • Deploy geofencing and altitude limits as secondary safety measures to contain potential flyaway events
bash
# Configuration example: Reduce vulnerable window by setting minimum disarm delay
# Access PX4 parameters via QGroundControl or MAVLink
param set COM_DISARM_LAND 2.0    # Reduce auto-disarm delay to 2 seconds (default may be higher)
param set COM_DISARM_PRFLT 3.0   # Set preflight disarm timeout
param save                       # Save parameters to persistent storage

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechDronecode Px4 Drone Autopilot

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-862
  • Vendor Resources
  • GitHub Vulnerability Report
  • Related CVEs
  • CVE-2026-32743: PX4 Autopilot Buffer Overflow Vulnerability

  • CVE-2026-32705: Dronecode PX4 Buffer Overflow Vulnerability

  • CVE-2026-32708: PX4 Autopilot Buffer Overflow Vulnerability

  • CVE-2026-32707: Dronecode PX4 Autopilot DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English