CVE-2023-51456

Description

A Improper Input Validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000 could allow an attacker to trigger an out-of-bound read/write into the process memory through a crafted payload due to a missing input sanity check in the v2_pack_array_to_msg function implemented in the libv2_sdk.so library imported by the v2_sdk_service binary implementing the service, potentially leading to a memory information leak or an arbitrary code execution. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.

Category

6.8
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.07%
Affected: DJI Mavic 3 Pro
Affected: DJI Mavic 3
Affected: DJI Mavic 3 Classic
Affected: DJI Mavic 3 Enterprise
Affected: DJI Matrice 300
Affected: DJI Matrice M30
Affected: DJI Mini 3 Pro
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-51456?
CVE-2023-51456 has been scored as a medium severity vulnerability.
How to fix CVE-2023-51456?
To fix CVE-2023-51456, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-51456 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-51456 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-51456?
CVE-2023-51456 affects DJI Mavic 3 Pro, DJI Mavic 3, DJI Mavic 3 Classic, DJI Mavic 3 Enterprise, DJI Matrice 300, DJI Matrice M30, DJI Mini 3 Pro.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.