CVE-2025-67780: CWE-306 Missing Authentication for Critical Function in SpaceX Starlink Dish
SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
AI Analysis
Technical Summary
CVE-2025-67780 identifies a missing authentication vulnerability (CWE-306) in SpaceX Starlink Dish devices running firmware 2024.12.04.mr46620, notably on models like Mini1_prod2. The vulnerability arises because the device's LAN gRPC interface accepts administrative commands without requiring authentication, allowing any attacker with local network access to perform critical functions. The cross-origin resource sharing (CORS) policy can be bypassed by omitting the Referer header, enabling unauthorized web-based requests. This lack of authentication on critical functions exposes the device to potential unauthorized configuration changes, which could disrupt service or degrade device integrity. Furthermore, the vulnerability permits attackers to read sensor data such as tilt, rotation, and elevation through gRPC calls. This information leakage can assist attackers in geolocating the physical position of the Starlink dish, potentially compromising user privacy and security. The vulnerability has a CVSS 3.1 base score of 4.2, reflecting medium severity with low confidentiality impact but some availability impact due to possible administrative misuse. Exploitation requires local network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). No public exploits or active exploitation have been reported to date. The absence of authentication on critical functions represents a significant security design flaw that SpaceX will need to address in future firmware updates.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to confidentiality and availability. Unauthorized administrative access could allow attackers to alter device configurations, potentially disrupting internet connectivity reliant on Starlink dishes. This is particularly concerning for critical infrastructure, emergency services, and remote operations that depend on Starlink for reliable communication. The ability to infer geographic location from sensor data may expose sensitive operational locations or user privacy, which could have implications for organizations handling confidential or classified information. Although exploitation requires local network access, environments with less secure LAN segmentation or shared networks increase risk. The medium CVSS score reflects moderate impact, but the strategic importance of uninterrupted satellite internet for remote or underserved areas in Europe elevates the operational risk. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop tools to leverage this vulnerability.
Mitigation Recommendations
European organizations using Starlink dishes should implement strict network segmentation to isolate Starlink devices from general user networks, minimizing local network exposure. Employ network access controls such as MAC filtering and VLANs to restrict LAN access to trusted administrators only. Monitor network traffic for unusual gRPC requests or unauthorized administrative commands targeting Starlink devices. Disable or restrict LAN gRPC interfaces if possible until a firmware patch is available. Engage with SpaceX support channels to obtain updates or advisories and apply firmware updates promptly once released. Consider physical security controls to prevent unauthorized local network access near Starlink hardware. For organizations with sensitive deployments, conduct regular security audits and penetration tests focusing on satellite communication infrastructure. Document and enforce policies for device management and incident response related to Starlink equipment. Finally, maintain awareness of threat intelligence updates concerning this vulnerability and related exploits.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-67780: CWE-306 Missing Authentication for Critical Function in SpaceX Starlink Dish
Description
SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
AI-Powered Analysis
Technical Analysis
CVE-2025-67780 identifies a missing authentication vulnerability (CWE-306) in SpaceX Starlink Dish devices running firmware 2024.12.04.mr46620, notably on models like Mini1_prod2. The vulnerability arises because the device's LAN gRPC interface accepts administrative commands without requiring authentication, allowing any attacker with local network access to perform critical functions. The cross-origin resource sharing (CORS) policy can be bypassed by omitting the Referer header, enabling unauthorized web-based requests. This lack of authentication on critical functions exposes the device to potential unauthorized configuration changes, which could disrupt service or degrade device integrity. Furthermore, the vulnerability permits attackers to read sensor data such as tilt, rotation, and elevation through gRPC calls. This information leakage can assist attackers in geolocating the physical position of the Starlink dish, potentially compromising user privacy and security. The vulnerability has a CVSS 3.1 base score of 4.2, reflecting medium severity with low confidentiality impact but some availability impact due to possible administrative misuse. Exploitation requires local network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). No public exploits or active exploitation have been reported to date. The absence of authentication on critical functions represents a significant security design flaw that SpaceX will need to address in future firmware updates.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to confidentiality and availability. Unauthorized administrative access could allow attackers to alter device configurations, potentially disrupting internet connectivity reliant on Starlink dishes. This is particularly concerning for critical infrastructure, emergency services, and remote operations that depend on Starlink for reliable communication. The ability to infer geographic location from sensor data may expose sensitive operational locations or user privacy, which could have implications for organizations handling confidential or classified information. Although exploitation requires local network access, environments with less secure LAN segmentation or shared networks increase risk. The medium CVSS score reflects moderate impact, but the strategic importance of uninterrupted satellite internet for remote or underserved areas in Europe elevates the operational risk. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop tools to leverage this vulnerability.
Mitigation Recommendations
European organizations using Starlink dishes should implement strict network segmentation to isolate Starlink devices from general user networks, minimizing local network exposure. Employ network access controls such as MAC filtering and VLANs to restrict LAN access to trusted administrators only. Monitor network traffic for unusual gRPC requests or unauthorized administrative commands targeting Starlink devices. Disable or restrict LAN gRPC interfaces if possible until a firmware patch is available. Engage with SpaceX support channels to obtain updates or advisories and apply firmware updates promptly once released. Consider physical security controls to prevent unauthorized local network access near Starlink hardware. For organizations with sensitive deployments, conduct regular security audits and penetration tests focusing on satellite communication infrastructure. Document and enforce policies for device management and incident response related to Starlink equipment. Finally, maintain awareness of threat intelligence updates concerning this vulnerability and related exploits.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-11T23:05:43.880Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b524b8a7c12acf2bed11d
Added to database: 12/11/2025, 11:22:51 PM
Last enriched: 12/19/2025, 5:39:14 AM
Last updated: 2/6/2026, 11:08:51 PM
Views: 195
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.