{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-39289","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2024-08-01T12:00:12.191Z","datePublished":"2025-07-17T19:11:07.080Z","dateUpdated":"2025-07-18T08:04:04.631Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["rosparam"],"packageName":"rosparam","platforms":["Linux","Windows","MacOS"],"product":"Robot Operating System (ROS)","repo":"https://github.com/ros/ros_comm","vendor":"Open Source Robotics Foundation","versions":[{"version":"Noetic Ninjemys","status":"affected"},{"version":"Melodic Morenia","status":"affected"},{"version":"Kinetic Kame","status":"affected"},{"version":"Indigo Igloo","status":"affected"}]}],"credits":[{"lang":"en","type":"finder","value":"Florencia Cabral Berenfus, Ubuntu Robotics Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code."}],"value":"A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code."}],"solutions":[{"lang":"en","value":"All ROS (1) versions are EOL, upgrade to a ROS 2 version."}],"impacts":[{"capecId":"CAPEC-586","descriptions":[{"lang":"en","value":"CAPEC-586 Object Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-95","description":"CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"source":{"discovery":"INTERNAL"},"references":[{"tags":["product"],"url":"https://www.ros.org/blog/noetic-eol/"}],"title":"Unsafe use of eval() method in rosparam tool","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2025-07-18T08:04:04.631Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-17T20:35:48.704499Z","id":"CVE-2024-39289","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-17T20:35:59.863Z"}}]}}