Vulnerabilites related to Open Source Robotics Foundation - Robot Operating System (ROS)
CVE-2024-41921 (GCVE-0-2024-41921)
Vulnerability from cvelistv5
Published
2025-07-17 19:13
Modified
2025-07-18 08:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'echo' verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41921", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:37:06.242493Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:37:17.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rostopic" ], "packageName": "rostopic", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027echo\u0027 verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027echo\u0027 verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:05:08.288Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rostopic echo tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-41921", "datePublished": "2025-07-17T19:13:34.025Z", "dateReserved": "2024-08-08T14:41:22.680Z", "dateUpdated": "2025-07-18T08:05:08.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39289 (GCVE-0-2024-39289)
Vulnerability from cvelistv5
Published
2025-07-17 19:11
Modified
2025-07-18 08:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code.
References
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39289", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:35:48.704499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:35:59.863Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rosparam" ], "packageName": "rosparam", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code execution vulnerability has been discovered in the Robot Operating System (ROS) \u0027rosparam\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code." } ], "value": "A code execution vulnerability has been discovered in the Robot Operating System (ROS) \u0027rosparam\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:04.631Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rosparam tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-39289", "datePublished": "2025-07-17T19:11:07.080Z", "dateReserved": "2024-08-01T12:00:12.191Z", "dateUpdated": "2025-07-18T08:04:04.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39835 (GCVE-0-2024-39835)
Vulnerability from cvelistv5
Published
2025-07-17 19:12
Modified
2025-07-18 08:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.
References
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39835", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:36:20.278839Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:36:29.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "roslaunch" ], "packageName": "roslaunch", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been identified in the Robot Operating System (ROS) \u0027roslaunch\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code." } ], "value": "A code injection vulnerability has been identified in the Robot Operating System (ROS) \u0027roslaunch\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:28.875Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in roslaunch tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-39835", "datePublished": "2025-07-17T19:12:08.177Z", "dateReserved": "2024-08-08T14:41:22.665Z", "dateUpdated": "2025-07-18T08:04:28.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41148 (GCVE-0-2024-41148)
Vulnerability from cvelistv5
Published
2025-07-17 19:12
Modified
2025-07-18 08:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'hz' verb, which reports the publishing rate of a topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:36:47.021797Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:36:53.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rostopic" ], "packageName": "rostopic", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027hz\u0027 verb, which reports the publishing rate of a topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027hz\u0027 verb, which reports the publishing rate of a topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:55.109Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rostopic hz tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-41148", "datePublished": "2025-07-17T19:12:54.440Z", "dateReserved": "2024-08-01T12:00:12.200Z", "dateUpdated": "2025-07-18T08:04:55.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39780 (GCVE-0-2024-39780)
Vulnerability from cvelistv5
Published
2025-04-02 07:31
Modified
2025-06-18 10:11
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39780", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-02T16:17:01.985759Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-02T16:20:24.302Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "dynparam" ], "packageName": "dynamic_reconfigure", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "programFiles": [ "scripts/dynparam" ], "repo": "https://github.com/ros/dynamic_reconfigure/", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A YAML deserialization vulnerability was found in the Robot Operating System (ROS) \u0027dynparam\u0027, a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the \u0027set\u0027 and \u0027get\u0027 verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code." } ], "value": "A YAML deserialization vulnerability was found in the Robot Operating System (ROS) \u0027dynparam\u0027, a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the \u0027set\u0027 and \u0027get\u0027 verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-18T10:11:42.754Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "url": "https://github.com/ros/dynamic_reconfigure/pull/202" } ], "source": { "discovery": "EXTERNAL" }, "title": "Use of unsafe yaml load in dynparam" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-39780", "datePublished": "2025-04-02T07:31:57.906Z", "dateReserved": "2024-08-08T14:41:22.673Z", "dateUpdated": "2025-06-18T10:11:42.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-3753 (GCVE-0-2025-3753)
Vulnerability from cvelistv5
Published
2025-07-17 19:14
Modified
2025-07-18 08:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code.
References
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3753", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:38:16.660029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:38:23.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rosbag" ], "packageName": "rosbag", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Giuseppe Barbieri, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code execution vulnerability has been identified in the Robot Operating System (ROS) \u0027rosbag\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the \u0027rosbag filter\u0027 command. This flaw enables attackers to craft and execute arbitrary Python code." } ], "value": "A code execution vulnerability has been identified in the Robot Operating System (ROS) \u0027rosbag\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the \u0027rosbag filter\u0027 command. This flaw enables attackers to craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:05:27.171Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rosbag tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2025-3753", "datePublished": "2025-07-17T19:14:20.486Z", "dateReserved": "2025-04-16T22:19:19.339Z", "dateUpdated": "2025-07-18T08:05:27.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }