CVE-2020-10282

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-10282
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10282.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-10282
Published
2020-07-03T15:15:09Z
Modified
2025-01-08T06:36:40.857628Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized access, PITM attacks and more. According to literature, version 2.0 optionally allows for package signing which mitigates this flaw. Another source mentions that MAVLink 2.0 only provides a simple authentication system based on HMAC. This implies that the flying system overall should add the same symmetric key into all devices of network. If not the case, this may cause a security issue, that if one of the devices and its symmetric key are compromised, the whole authentication system is not reliable.

References

Affected packages

Git / github.com/mavlink/mavlink

Affected ranges

Type
GIT
Repo
https://github.com/mavlink/mavlink
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0