Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68273: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in SignalK signalk-server

0
Medium
VulnerabilityCVE-2025-68273cvecve-2025-68273cwe-200
Published: Thu Jan 01 2026 (01/01/2026, 18:21:51 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue.

AI-Powered Analysis

AILast updated: 01/01/2026, 18:44:36 UTC

Technical Analysis

SignalK signalk-server is a server application designed to run on a central hub in boats, facilitating data exchange and system monitoring. Versions prior to 2.19.0 contain an unauthenticated information disclosure vulnerability (CVE-2025-68273) classified under CWE-200. This flaw allows any unauthenticated user to access sensitive system information, including the complete SignalK data schema, details about connected serial devices, and installed analyzer tools. Such information leakage does not directly compromise system integrity or availability but significantly aids attackers by providing detailed reconnaissance data. The vulnerability is remotely exploitable without any user interaction or authentication, increasing its risk profile. The CVSS 3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact and ease of exploitation. No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on January 1, 2026, and fixed in version 2.19.0 of the signalk-server software. Organizations running affected versions are advised to upgrade to the patched release to prevent unauthorized data exposure.

Potential Impact

For European organizations, particularly those involved in maritime operations such as shipping companies, port authorities, and marine research institutions, this vulnerability poses a significant risk. Exposure of the SignalK data schema and connected device information can facilitate targeted attacks against vessel control systems or navigation aids. Attackers could leverage this reconnaissance to craft more sophisticated attacks, potentially leading to operational disruptions or safety hazards. While the vulnerability does not directly allow system control or data modification, the sensitive information disclosed could be used in multi-stage attacks, increasing the overall threat landscape. Given Europe's extensive maritime industry and reliance on digital systems for vessel management, the impact could affect operational security and safety compliance.

Mitigation Recommendations

European maritime organizations should immediately verify their signalk-server version and upgrade to version 2.19.0 or later to remediate the vulnerability. Network segmentation should be enforced to restrict access to the signalk-server from untrusted networks, limiting exposure to potential attackers. Implementing strong access controls and monitoring on the central hub devices can detect and prevent unauthorized access attempts. Additionally, organizations should conduct regular audits of connected serial devices and installed tools to identify any anomalies. Employing intrusion detection systems tailored for maritime environments can provide early warnings of reconnaissance activities. Finally, integrating vulnerability management processes to track and apply updates promptly will reduce exposure to similar future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6956bce0db813ff03e75fde5

Added to database: 1/1/2026, 6:28:48 PM

Last enriched: 1/1/2026, 6:44:36 PM

Last updated: 1/8/2026, 7:24:01 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats