Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-39780


A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.


Published

2025-04-02T08:15:13.720

Last Modified

2025-08-26T16:36:48.180

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
    CWE-502

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System openrobotics robot_operating_system indigo_igloo Yes
Operating System openrobotics robot_operating_system kinetic_kame Yes
Operating System openrobotics robot_operating_system melodic_morenia Yes
Operating System openrobotics robot_operating_system noetic_ninjemys Yes

References