Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68273: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in SignalK signalk-server

0
Medium
VulnerabilityCVE-2025-68273cvecve-2025-68273cwe-200
Published: Thu Jan 01 2026 (01/01/2026, 18:21:51 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue.

AI-Powered Analysis

AILast updated: 01/08/2026, 19:09:27 UTC

Technical Analysis

SignalK signalk-server is a server application deployed on central hubs in boats to manage and distribute marine data. Versions prior to 2.19.0 contain an unauthenticated information disclosure vulnerability (CVE-2025-68273) classified under CWE-200, which allows any unauthenticated user to retrieve sensitive system information. Specifically, attackers can access the full SignalK data schema, details of connected serial devices, and installed analyzer tools. This information leakage does not directly compromise data integrity or availability but provides attackers with valuable reconnaissance data that can be leveraged for subsequent targeted attacks against the vessel's systems or network. The vulnerability is remotely exploitable over the network without requiring any user interaction or privileges, increasing its risk profile. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of exploitation and limited confidentiality impact. The vulnerability was publicly disclosed on January 1, 2026, and patched in version 2.19.0 of signalk-server. No known exploits have been reported in the wild, but the exposure of system internals could facilitate more sophisticated attacks if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations involved in maritime operations, especially those using SignalK signalk-server on vessels or maritime hubs, this vulnerability poses a moderate risk. The unauthorized disclosure of system information can aid attackers in mapping the network and identifying connected devices, which may be critical for navigation, communication, or control systems. This reconnaissance can be a precursor to more damaging attacks such as device manipulation, data tampering, or denial of service. Although the vulnerability itself does not allow direct control or data modification, the information exposed could be leveraged by threat actors targeting maritime infrastructure, which is strategically important in Europe for trade, defense, and transportation. The impact is heightened for organizations operating in sensitive or high-traffic maritime regions where attackers may seek to disrupt operations or gather intelligence.

Mitigation Recommendations

European maritime organizations should immediately upgrade all instances of signalk-server to version 2.19.0 or later to remediate this vulnerability. In addition, network segmentation should be enforced to isolate signalk-server hubs from public or less trusted networks, reducing exposure to unauthenticated access. Implement strict access controls and monitoring on maritime network devices to detect unusual reconnaissance activity. Employ network-level protections such as firewalls and intrusion detection systems configured to alert on anomalous requests targeting signalk-server endpoints. Regularly audit and inventory connected serial devices and analyzer tools to identify unauthorized changes or additions. Finally, integrate vulnerability management processes to ensure timely patching of maritime software components and maintain situational awareness of emerging threats targeting marine infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6956bce0db813ff03e75fde5

Added to database: 1/1/2026, 6:28:48 PM

Last enriched: 1/8/2026, 7:09:27 PM

Last updated: 2/7/2026, 5:17:16 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats