Description
A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.
INFO
Published Date :
2025-04-02T07:31:57.906Z
Last Modified :
2025-06-18T10:11:42.754Z
Source :
canonical
AFFECTED PRODUCTS
The following products are affected by CVE-2024-39780 vulnerability.
| Vendors | Products |
|---|---|
| Openrobotics |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-39780.
| URL | Resource |
|---|---|
| https://github.com/ros/dynamic_reconfigure/pull/202 |
|
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact