Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68272: CWE-400: Uncontrolled Resource Consumption in SignalK signalk-server

0
High
VulnerabilityCVE-2025-68272cvecve-2025-68272cwe-400cwe-770
Published: Thu Jan 01 2026 (01/01/2026, 18:08:06 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/signalk/v1/access/requests`). This causes a "JavaScript heap out of memory" error due to unbounded in-memory storage of request objects. Version 2.19.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/01/2026, 18:43:48 UTC

Technical Analysis

CVE-2025-68272 is a Denial of Service vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the SignalK Server, a Node.js-based server application that runs on a central hub in boats to manage marine data. The vulnerability exists in versions prior to 2.19.0 and allows an unauthenticated remote attacker to send a high volume of requests to the /signalk/v1/access/requests endpoint. The server maintains these requests in memory without any bounding or throttling, leading to excessive memory consumption. This causes a JavaScript heap out of memory error, crashing the server and resulting in a denial of service. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, no required privileges or user interaction, and the impact limited to availability. The vulnerability does not compromise confidentiality or integrity but disrupts the availability of the SignalK Server, which is critical for marine data communication and vessel operations. The fix was introduced in version 2.19.0, which presumably implements request rate limiting or memory management improvements to prevent unbounded resource consumption. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk for maritime environments relying on this software.

Potential Impact

For European organizations, particularly those involved in maritime operations, yacht management, and marine data services, this vulnerability poses a significant risk to operational continuity. The SignalK Server is central to managing and distributing navigational and sensor data on boats; a DoS attack could disable this functionality, potentially impacting navigation safety, monitoring, and communication systems onboard. This disruption could lead to operational delays, increased risk of accidents, and financial losses. Additionally, organizations providing marine data services or fleet management could suffer reputational damage and client trust erosion if their systems are compromised. The impact is primarily on availability, but in critical maritime contexts, availability loss can indirectly affect safety and operational integrity. European maritime hubs and companies that integrate SignalK Server into their vessels or infrastructure are at heightened risk, especially if they have not updated to the patched version.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of SignalK Server to version 2.19.0 or later, where the vulnerability is fixed. Organizations should implement network-level protections such as rate limiting and anomaly detection on the /signalk/v1/access/requests endpoint to prevent flooding attempts. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block excessive request patterns can further reduce risk. Monitoring server resource utilization and setting alerts for unusual memory consumption can provide early warning signs of an attack. Additionally, isolating the SignalK Server within a segmented network zone and restricting access to trusted IP ranges can limit exposure. Regular vulnerability scanning and patch management processes should be enforced to ensure timely updates. Finally, maritime organizations should incorporate this vulnerability into their incident response planning to quickly address potential DoS incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6956bce0db813ff03e75fdef

Added to database: 1/1/2026, 6:28:48 PM

Last enriched: 1/1/2026, 6:43:48 PM

Last updated: 1/8/2026, 7:22:09 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats