Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67780: CWE-306 Missing Authentication for Critical Function in SpaceX Starlink Dish

0
Medium
VulnerabilityCVE-2025-67780cvecve-2025-67780cwe-306
Published: Thu Dec 11 2025 (12/11/2025, 23:05:44 UTC)
Source: CVE Database V5
Vendor/Project: SpaceX
Product: Starlink Dish

Description

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:39:14 UTC

Technical Analysis

CVE-2025-67780 identifies a missing authentication vulnerability (CWE-306) in SpaceX Starlink Dish devices running firmware 2024.12.04.mr46620, notably on models like Mini1_prod2. The vulnerability arises because the device's LAN gRPC interface accepts administrative commands without requiring authentication, allowing any attacker with local network access to perform critical functions. The cross-origin resource sharing (CORS) policy can be bypassed by omitting the Referer header, enabling unauthorized web-based requests. This lack of authentication on critical functions exposes the device to potential unauthorized configuration changes, which could disrupt service or degrade device integrity. Furthermore, the vulnerability permits attackers to read sensor data such as tilt, rotation, and elevation through gRPC calls. This information leakage can assist attackers in geolocating the physical position of the Starlink dish, potentially compromising user privacy and security. The vulnerability has a CVSS 3.1 base score of 4.2, reflecting medium severity with low confidentiality impact but some availability impact due to possible administrative misuse. Exploitation requires local network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). No public exploits or active exploitation have been reported to date. The absence of authentication on critical functions represents a significant security design flaw that SpaceX will need to address in future firmware updates.

Potential Impact

For European organizations, the vulnerability poses a risk primarily to confidentiality and availability. Unauthorized administrative access could allow attackers to alter device configurations, potentially disrupting internet connectivity reliant on Starlink dishes. This is particularly concerning for critical infrastructure, emergency services, and remote operations that depend on Starlink for reliable communication. The ability to infer geographic location from sensor data may expose sensitive operational locations or user privacy, which could have implications for organizations handling confidential or classified information. Although exploitation requires local network access, environments with less secure LAN segmentation or shared networks increase risk. The medium CVSS score reflects moderate impact, but the strategic importance of uninterrupted satellite internet for remote or underserved areas in Europe elevates the operational risk. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially if attackers develop tools to leverage this vulnerability.

Mitigation Recommendations

European organizations using Starlink dishes should implement strict network segmentation to isolate Starlink devices from general user networks, minimizing local network exposure. Employ network access controls such as MAC filtering and VLANs to restrict LAN access to trusted administrators only. Monitor network traffic for unusual gRPC requests or unauthorized administrative commands targeting Starlink devices. Disable or restrict LAN gRPC interfaces if possible until a firmware patch is available. Engage with SpaceX support channels to obtain updates or advisories and apply firmware updates promptly once released. Consider physical security controls to prevent unauthorized local network access near Starlink hardware. For organizations with sensitive deployments, conduct regular security audits and penetration tests focusing on satellite communication infrastructure. Document and enforce policies for device management and incident response related to Starlink equipment. Finally, maintain awareness of threat intelligence updates concerning this vulnerability and related exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-11T23:05:43.880Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b524b8a7c12acf2bed11d

Added to database: 12/11/2025, 11:22:51 PM

Last enriched: 12/19/2025, 5:39:14 AM

Last updated: 2/6/2026, 11:08:51 PM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats