Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67268: n/a

0
Critical
VulnerabilityCVE-2025-67268cvecve-2025-67268
Published: Fri Jan 02 2026 (01/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.

AI-Powered Analysis

AILast updated: 01/09/2026, 16:55:14 UTC

Technical Analysis

CVE-2025-67268 is a critical vulnerability identified in gpsd, an open-source GPS service daemon widely used to interface with GNSS devices. The flaw exists in the driver_nmea2000.c file, specifically within the hnd_129540 function that processes NMEA2000 PGN 129540 packets, which convey GNSS Satellites in View data. The vulnerability stems from the function's failure to validate the user-supplied satellite count against the fixed size of the skyview array, which holds 184 elements. An attacker can supply a satellite count value up to 255, causing a heap-based out-of-bounds write beyond the array's allocated memory. This memory corruption can lead to denial of service by crashing the gpsd process or, more severely, enable arbitrary code execution, potentially allowing remote attackers to take control of affected systems. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no known exploits are currently reported in the wild, the high CVSS score of 9.8 reflects the critical nature of this flaw. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs. No patches are currently linked, indicating that organizations should monitor vendor updates closely. Given gpsd's role in GNSS data handling, this vulnerability could impact systems relying on precise location data, including transportation, maritime navigation, and critical infrastructure monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-67268 can be significant, especially in sectors dependent on accurate GNSS data such as maritime shipping, aviation, public transportation, and critical infrastructure. Exploitation could lead to denial of service, disrupting location-based services and operational continuity. More critically, arbitrary code execution could allow attackers to gain control over systems processing GNSS data, potentially leading to data breaches, manipulation of navigation data, or further lateral movement within networks. This poses risks to safety-critical systems and could undermine trust in location-dependent services. The vulnerability’s network-exploitable nature means attackers can target exposed gpsd instances remotely, increasing the attack surface. European organizations with interconnected OT and IT environments may face compounded risks if attackers leverage this flaw to pivot into broader network segments. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

Organizations should immediately inventory their use of gpsd, particularly versions prior to the fix commit dc966aa, and identify systems processing NMEA2000 GNSS data. Until patches are available, restrict network access to gpsd services by implementing firewall rules limiting inbound traffic to trusted sources only. Employ network segmentation to isolate GNSS data processing systems from general IT networks. Monitor network traffic for anomalous or malformed NMEA2000 PGN 129540 packets that could indicate exploitation attempts. Implement host-based intrusion detection systems (HIDS) to detect abnormal gpsd process behavior or crashes. Engage with gpsd maintainers and subscribe to security advisories to apply patches promptly once released. For critical systems, consider deploying application-level mitigations such as input validation wrappers or sandboxing gpsd processes to limit potential damage from exploitation. Additionally, conduct regular security assessments and penetration tests focusing on GNSS data handling components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6957eeb8db813ff03ef3fe94

Added to database: 1/2/2026, 4:13:44 PM

Last enriched: 1/9/2026, 4:55:14 PM

Last updated: 2/6/2026, 8:34:00 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats