CVE-2020-10283

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-10283
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10283.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-10283
Published
2020-08-20T09:15:11Z
Modified
2024-09-03T03:06:32.201080Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.

References

Affected packages

Git / github.com/mavlink/mavlink

Affected ranges

Type
GIT
Repo
https://github.com/mavlink/mavlink
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0