CVE-2025-67268: n/a
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-67268 is a critical vulnerability identified in gpsd, an open-source GPS service daemon widely used to interface with GNSS devices. The flaw exists in the driver_nmea2000.c file, specifically within the hnd_129540 function that processes NMEA2000 PGN 129540 packets, which convey GNSS Satellites in View data. The vulnerability stems from the function's failure to validate the user-supplied satellite count against the fixed size of the skyview array, which holds 184 elements. An attacker can supply a satellite count value up to 255, causing a heap-based out-of-bounds write beyond the array's allocated memory. This memory corruption can lead to denial of service by crashing the gpsd process or, more severely, enable arbitrary code execution, potentially allowing remote attackers to take control of affected systems. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no known exploits are currently reported in the wild, the high CVSS score of 9.8 reflects the critical nature of this flaw. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs. No patches are currently linked, indicating that organizations should monitor vendor updates closely. Given gpsd's role in GNSS data handling, this vulnerability could impact systems relying on precise location data, including transportation, maritime navigation, and critical infrastructure monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67268 can be significant, especially in sectors dependent on accurate GNSS data such as maritime shipping, aviation, public transportation, and critical infrastructure. Exploitation could lead to denial of service, disrupting location-based services and operational continuity. More critically, arbitrary code execution could allow attackers to gain control over systems processing GNSS data, potentially leading to data breaches, manipulation of navigation data, or further lateral movement within networks. This poses risks to safety-critical systems and could undermine trust in location-dependent services. The vulnerability’s network-exploitable nature means attackers can target exposed gpsd instances remotely, increasing the attack surface. European organizations with interconnected OT and IT environments may face compounded risks if attackers leverage this flaw to pivot into broader network segments. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their use of gpsd, particularly versions prior to the fix commit dc966aa, and identify systems processing NMEA2000 GNSS data. Until patches are available, restrict network access to gpsd services by implementing firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate GNSS data processing systems from general IT networks. Monitor network traffic for anomalous or malformed NMEA2000 PGN 129540 packets that could indicate exploitation attempts. Implement host-based intrusion detection systems (HIDS) to detect abnormal gpsd process behavior or crashes. Engage with gpsd maintainers and subscribe to security advisories to apply patches promptly once released. For critical systems, consider deploying application-level mitigations such as input validation wrappers or sandboxing gpsd processes to limit potential damage from exploitation. Additionally, conduct regular security assessments and penetration tests focusing on GNSS data handling components.
Affected Countries
Germany, Netherlands, Norway, United Kingdom, France, Italy, Spain
CVE-2025-67268: n/a
Description
gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-67268 is a critical vulnerability identified in gpsd, an open-source GPS service daemon widely used to interface with GNSS devices. The flaw exists in the driver_nmea2000.c file, specifically within the hnd_129540 function that processes NMEA2000 PGN 129540 packets, which convey GNSS Satellites in View data. The vulnerability stems from the function's failure to validate the user-supplied satellite count against the fixed size of the skyview array, which holds 184 elements. An attacker can supply a satellite count value up to 255, causing a heap-based out-of-bounds write beyond the array's allocated memory. This memory corruption can lead to denial of service by crashing the gpsd process or, more severely, enable arbitrary code execution, potentially allowing remote attackers to take control of affected systems. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no known exploits are currently reported in the wild, the high CVSS score of 9.8 reflects the critical nature of this flaw. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs. No patches are currently linked, indicating that organizations should monitor vendor updates closely. Given gpsd's role in GNSS data handling, this vulnerability could impact systems relying on precise location data, including transportation, maritime navigation, and critical infrastructure monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-67268 can be significant, especially in sectors dependent on accurate GNSS data such as maritime shipping, aviation, public transportation, and critical infrastructure. Exploitation could lead to denial of service, disrupting location-based services and operational continuity. More critically, arbitrary code execution could allow attackers to gain control over systems processing GNSS data, potentially leading to data breaches, manipulation of navigation data, or further lateral movement within networks. This poses risks to safety-critical systems and could undermine trust in location-dependent services. The vulnerability’s network-exploitable nature means attackers can target exposed gpsd instances remotely, increasing the attack surface. European organizations with interconnected OT and IT environments may face compounded risks if attackers leverage this flaw to pivot into broader network segments. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.
Mitigation Recommendations
Organizations should immediately inventory their use of gpsd, particularly versions prior to the fix commit dc966aa, and identify systems processing NMEA2000 GNSS data. Until patches are available, restrict network access to gpsd services by implementing firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate GNSS data processing systems from general IT networks. Monitor network traffic for anomalous or malformed NMEA2000 PGN 129540 packets that could indicate exploitation attempts. Implement host-based intrusion detection systems (HIDS) to detect abnormal gpsd process behavior or crashes. Engage with gpsd maintainers and subscribe to security advisories to apply patches promptly once released. For critical systems, consider deploying application-level mitigations such as input validation wrappers or sandboxing gpsd processes to limit potential damage from exploitation. Additionally, conduct regular security assessments and penetration tests focusing on GNSS data handling components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6957eeb8db813ff03ef3fe94
Added to database: 1/2/2026, 4:13:44 PM
Last enriched: 1/9/2026, 4:55:14 PM
Last updated: 2/6/2026, 8:34:00 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24926: CWE-787 Out-of-bounds Write in Huawei HarmonyOS
HighCVE-2026-24925: CWE-122 Heap-based Buffer Overflow in Huawei HarmonyOS
HighCVE-2026-21643: Execute unauthorized code or commands in Fortinet FortiClientEMS
CriticalCVE-2026-2010: Improper Authorization in Sanluan PublicCMS
LowCVE-2025-69619: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.