A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ros.org/blog/noetic-eol/ |
![]() ![]() |
History
Thu, 17 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 17 Jul 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code. | |
Title | Unsafe use of eval() method in rosparam tool | |
Weaknesses | CWE-94 CWE-95 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: canonical
Published: 2025-07-17T19:11:07.080Z
Updated: 2025-07-18T08:04:04.631Z
Reserved: 2024-08-01T12:00:12.191Z
Link: CVE-2024-39289

Updated: 2025-07-17T20:35:57.151Z

Status : Awaiting Analysis
Published: 2025-07-17T20:15:27.230
Modified: 2025-07-17T21:15:50.197
Link: CVE-2024-39289

No data.