CVE-2024-33844
📋 TL;DR
This vulnerability in Parrot ANAFI USA drone firmware allows attackers to disrupt the connection between the controller and drone by sending specially crafted MAVLink MISSION_COUNT commands with invalid mission types. It affects users of Parrot ANAFI USA drones running vulnerable firmware versions, potentially causing loss of control during flight operations.
💻 Affected Systems
- Parrot ANAFI USA drone
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of drone control leading to crash, property damage, or injury if drone falls in populated areas.
Likely Case
Temporary disruption of drone operations requiring manual recovery or restart of connection.
If Mitigated
Minor service interruption with automatic reconnection protocols or manual recovery procedures.
🎯 Exploit Status
Exploitation requires sending MAVLink packets to the drone's communication interface, which is typically unauthenticated for mission commands.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Parrot for updated firmware beyond 1.10.4
Vendor Advisory: https://forum.developer.parrot.com/t/cve-2024-33844-bugs-in-anafi-thermal-usa-firmware/22501
Restart Required: Yes
Instructions:
1. Check Parrot's official website or developer forum for firmware updates. 2. Download the latest firmware. 3. Connect drone to controller. 4. Apply firmware update through official Parrot app. 5. Restart drone and controller.
🔧 Temporary Workarounds
Restrict wireless access
allLimit drone operations to controlled environments where unauthorized wireless devices cannot reach the drone.
Monitor MAVLink traffic
allImplement network monitoring for unusual MAVLink MISSION_COUNT commands with invalid mission types.
🧯 If You Can't Patch
- Operate drone only in physically secure areas where attackers cannot access wireless range.
- Implement secondary control protocols or manual override systems for emergency recovery.
🔍 How to Verify
Check if Vulnerable:
Check drone firmware version in Parrot app settings; if version is 1.10.4, system is vulnerable.
Check Version:
Check firmware version in Parrot FreeFlight 6 USA app under Settings > My Devices > ANAFI USA
Verify Fix Applied:
After updating, verify firmware version shows a version higher than 1.10.4 in Parrot app.
📡 Detection & Monitoring
Log Indicators:
- Unusual MAVLink command sequences
- Multiple connection drops between controller and drone
- MISSION_COUNT commands with mission type values outside 0,1,2
Network Indicators:
- MAVLink packets with MISSION_COUNT command containing mission type 255 or other invalid values
- Sudden increase in MAVLink traffic from unknown sources
SIEM Query:
MAVLink protocol analysis for mission_type field values outside expected range (0,1,2)
🔗 References
- http://anafi.com
- http://nvd-cwe-other.com
- https://forum.developer.parrot.com/t/cve-2024-33844-bugs-in-anafi-thermal-usa-firmware/22501
- https://forum.developer.parrot.com/t/cve-2024-33844-bugs-in-anafi-thermal-usa-firmware/22501/1
- http://anafi.com
- http://nvd-cwe-other.com
- https://forum.developer.parrot.com/t/cve-2024-33844-bugs-in-anafi-thermal-usa-firmware/22501
- https://forum.developer.parrot.com/t/cve-2024-33844-bugs-in-anafi-thermal-usa-firmware/22501/1