Description

A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.

INFO

Published Date :

2025-04-02T07:31:57.906Z

Last Modified :

2025-06-18T10:11:42.754Z

Source :

canonical
AFFECTED PRODUCTS

The following products are affected by CVE-2024-39780 vulnerability.

Vendors Products
Openrobotics
  • Robot Operating System
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-39780.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact