Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68272: CWE-400: Uncontrolled Resource Consumption in SignalK signalk-server

0
High
VulnerabilityCVE-2025-68272cvecve-2025-68272cwe-400cwe-770
Published: Thu Jan 01 2026 (01/01/2026, 18:08:06 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/signalk/v1/access/requests`). This causes a "JavaScript heap out of memory" error due to unbounded in-memory storage of request objects. Version 2.19.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/08/2026, 19:09:12 UTC

Technical Analysis

CVE-2025-68272 is a Denial of Service vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the SignalK Server, a server application deployed on central hubs in boats to manage maritime data. The vulnerability exists in versions prior to 2.19.0, where the server's /signalk/v1/access/requests endpoint accepts access requests without authentication or rate limiting. An attacker can send a high volume of requests to this endpoint, causing the server to store each request object in memory without bounds. This leads to excessive JavaScript heap memory usage, culminating in a crash with an 'out of memory' error. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity due to network attack vector, no required privileges or user interaction, and a significant impact on availability. The flaw does not affect confidentiality or integrity, as it only causes service disruption. The issue was publicly disclosed on January 1, 2026, and fixed in SignalK Server version 2.19.0. No known exploits have been reported in the wild, but the vulnerability poses a risk to maritime systems relying on SignalK for real-time data exchange and control. The root cause is the lack of input validation and resource management on the access request endpoint, allowing resource exhaustion through unbounded in-memory data accumulation.

Potential Impact

For European organizations, particularly those in the maritime and shipping sectors using SignalK Server on vessels or maritime infrastructure, this vulnerability can cause critical service disruptions. The DoS attack can incapacitate the central hub managing navigation, sensor data, and communication, potentially affecting vessel operations and safety. Although it does not compromise data confidentiality or integrity, the loss of availability can delay critical decision-making and operational commands. This is especially impactful for commercial shipping companies, port authorities, and maritime research institutions in Europe that rely on real-time data aggregation and distribution. The disruption could also affect interconnected systems dependent on SignalK data streams, amplifying operational risks. Given the increasing digitalization of maritime operations in Europe, the vulnerability could have cascading effects on logistics, safety, and regulatory compliance.

Mitigation Recommendations

The primary mitigation is to upgrade all SignalK Server instances to version 2.19.0 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict rate limiting and throttling on the /signalk/v1/access/requests endpoint to prevent flooding attacks. Deploy Web Application Firewalls (WAFs) or API gateways capable of detecting and blocking abnormal request patterns targeting this endpoint. Monitor server memory usage and set alerts for unusual spikes indicative of potential exploitation attempts. Network segmentation can isolate SignalK servers from untrusted networks, reducing exposure. Additionally, implement logging and anomaly detection to identify repeated access request floods. Maritime organizations should also review their incident response plans to include scenarios involving SignalK server DoS events. Finally, coordinate with vendors and maritime cybersecurity bodies to stay updated on patches and threat intelligence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6956bce0db813ff03e75fdef

Added to database: 1/1/2026, 6:28:48 PM

Last enriched: 1/8/2026, 7:09:12 PM

Last updated: 2/7/2026, 9:53:27 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats