CVE-2026-26011

navigation2 is a ROS 2 Navigation Framework and System. In 1.3.11 and earlier, a critical heap out-of-bounds write vulnerability exists in Nav2 AMCL's particle filter clustering logic. By publishing a single crafted geometry_msgs/PoseWithCovarianceStamped message with extreme covariance values to the /initialpose topic, an unauthenticated attacker on the same ROS 2 DDS domain can trigger a negative index write (set->clusters[-1]) into heap memory preceding the allocated buffer. In Release builds, the sole boundary check (assert) is compiled out, leaving zero runtime protection. This primitive allows controlled corruption of the heap chunk metadata(at least the size of the heap chunk where the set->clusters is in is controllable by the attacker), potentially leading to further exploitation. At minimum, it provides a reliable single-packet denial of service that kills localization and halts all navigation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opennav:nav2:*:*:*:*:*:*:*:*

History

23 Feb 2026, 17:00

Type Values Removed Values Added
Summary
  • (es) navigation2 es un Framework y Sistema de Navegación de ROS 2. En 1.3.11 y versiones anteriores, existe una vulnerabilidad crítica de escritura fuera de límites en el heap en la lógica de agrupamiento del filtro de partículas de Nav2 AMCL. Al publicar un único mensaje manipulado geometry_msgs/PoseWithCovarianceStamped con valores de covarianza extremos en el tema /initialpose, un atacante no autenticado en el mismo dominio DDS de ROS 2 puede desencadenar una escritura de índice negativo (set->clusters[-1]) en la memoria del heap que precede al búfer asignado. En las compilaciones de lanzamiento, la única comprobación de límites (assert) se elimina en la compilación, dejando cero protección en tiempo de ejecución. Esta primitiva permite la corrupción controlada de los metadatos del fragmento del heap (al menos el tamaño del fragmento del heap donde se encuentra set->clusters es controlable por el atacante), lo que podría conducir a una explotación posterior. Como mínimo, proporciona una denegación de servicio fiable de un solo paquete que detiene la localización y toda la navegación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:opennav:nav2:*:*:*:*:*:*:*:*
First Time Opennav
Opennav nav2
References () https://github.com/ros-navigation/navigation2/commit/d09ea82477ce9234678a6febf6890235e0a7ce12 - () https://github.com/ros-navigation/navigation2/commit/d09ea82477ce9234678a6febf6890235e0a7ce12 - Patch
References () https://github.com/ros-navigation/navigation2/releases/tag/1.3.11 - () https://github.com/ros-navigation/navigation2/releases/tag/1.3.11 - Product
References () https://github.com/ros-navigation/navigation2/security/advisories/GHSA-mgj5-g2p6-gc5x - () https://github.com/ros-navigation/navigation2/security/advisories/GHSA-mgj5-g2p6-gc5x - Exploit, Vendor Advisory

13 Feb 2026, 18:16

Type Values Removed Values Added
References () https://github.com/ros-navigation/navigation2/security/advisories/GHSA-mgj5-g2p6-gc5x - () https://github.com/ros-navigation/navigation2/security/advisories/GHSA-mgj5-g2p6-gc5x -

12 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-12 21:16

Updated : 2026-02-23 17:00


NVD link : CVE-2026-26011

Mitre link : CVE-2026-26011

CVE.ORG link : CVE-2026-26011


JSON object : View

Products Affected

opennav

  • nav2
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write