Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
RVD#3317: MAVLink version handshaking allows for an attacker to bypass authentication
Vulnerability Description
The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.
CVSS Information
N/A
Vulnerability Type
使用候选路径或通道进行的认证绕过
Vulnerability Title
Micro Air Vehicle Link 安全漏洞
Vulnerability Description
Micro Air Vehicle Link(MAVLink)是Dronecode项目的一款轻量级的消息传输协议,它主要用于地面控制终端(地面站)与无人机之间 (以及机载无人机组件之间) 的通信。 Micro Air Vehicle Link (MAVLink)协议中存在安全漏洞,该漏洞源于程序使用问答机制进行版本协商,没有采用身份验证机制。 攻击者可借助特制的软件包利用该漏洞绕过身份验证,直接与自动驾驶系统进行交互。
CVSS Information
N/A
Vulnerability Type
N/A