Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2753: CWE-36 Absolute Path Traversal in Navtor NavBox

0
High
VulnerabilityCVE-2026-2753cvecve-2026-2753cwe-36
Published: Fri Mar 06 2026 (03/06/2026, 15:04:47 UTC)
Source: CVE Database V5
Vendor/Project: Navtor
Product: NavBox

Description

CVE-2026-2753 is a high-severity Absolute Path Traversal vulnerability in Navtor NavBox version 4. 12. 0. 3. The vulnerability arises because the NavBox HTTP service does not properly sanitize user-supplied path input, allowing unauthenticated remote attackers to submit requests with absolute filesystem paths. Exploiting this flaw enables attackers to read arbitrary files on the underlying system with the privileges of the NavBox service process. This can lead to exposure of sensitive configuration files and system information, potentially aiding further attacks. No user interaction or authentication is required, and the vulnerability has a CVSS score of 7. 5. There are currently no known exploits in the wild or available patches.

AI-Powered Analysis

AILast updated: 03/06/2026, 15:30:44 UTC

Technical Analysis

CVE-2026-2753 is an Absolute Path Traversal vulnerability (CWE-36) found in Navtor NavBox version 4.12.0.3. NavBox exposes an HTTP service that accepts path parameters from clients but fails to properly sanitize or validate these inputs. This allows an attacker to craft requests containing absolute filesystem paths, bypassing intended file access restrictions. Because the service runs with certain system privileges, an attacker can retrieve arbitrary files from the filesystem, limited only by the service's access rights. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The impact is primarily confidentiality loss, as attackers can access sensitive files such as configuration data, credentials, or system information that could facilitate further compromise. The CVSS 3.1 base score is 7.5, reflecting high severity due to ease of exploitation and significant confidentiality impact. No patches or official fixes have been released yet, and no active exploitation has been reported. The flaw stems from improper input validation and insufficient path normalization in the HTTP service component of NavBox. This vulnerability highlights the critical need for secure coding practices around file path handling in network-facing applications.

Potential Impact

The primary impact of CVE-2026-2753 is unauthorized disclosure of sensitive information. Attackers can read arbitrary files on the NavBox host system, potentially exposing credentials, configuration files, logs, or other sensitive data. This can lead to further attacks such as privilege escalation, lateral movement, or targeted intrusion if attackers obtain secrets or system details. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any attacker with network access to the NavBox HTTP service. Organizations relying on NavBox for maritime navigation or related services may face operational risks if sensitive data is leaked or if attackers gain intelligence to disrupt services. Although integrity and availability are not directly impacted, the confidentiality breach alone can have severe consequences, especially in regulated or critical infrastructure environments. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as public disclosure may prompt attackers to develop exploits. The scope is limited to systems running the vulnerable NavBox version, but given Navtor's global maritime customer base, the potential reach is significant.

Mitigation Recommendations

1. Immediately identify and isolate all NavBox instances running version 4.12.0.3 to limit exposure. 2. Restrict network access to the NavBox HTTP service using firewall rules or network segmentation, allowing only trusted management hosts to connect. 3. Monitor HTTP service logs for suspicious requests containing absolute paths or unusual file access patterns. 4. Implement web application firewall (WAF) rules to detect and block path traversal attempts targeting NavBox endpoints. 5. Contact Navtor for official patches or updates addressing this vulnerability and apply them as soon as available. 6. If patching is not immediately possible, consider deploying reverse proxies or API gateways that sanitize and validate incoming path parameters before forwarding requests to NavBox. 7. Conduct a thorough audit of files accessible by the NavBox service account and restrict permissions to the minimum necessary. 8. Educate operational teams about this vulnerability and establish incident response plans in case of exploitation. 9. Regularly review and update security controls around maritime navigation infrastructure to reduce attack surface. These steps go beyond generic advice by focusing on network-level controls, proactive monitoring, and compensating controls until a patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MHV
Date Reserved
2026-02-19T14:48:28.512Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aaefb7c48b3f10ff9de72e

Added to database: 3/6/2026, 3:16:07 PM

Last enriched: 3/6/2026, 3:30:44 PM

Last updated: 3/6/2026, 8:24:29 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses