Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33950: CWE-285: Improper Authorization in SignalK signalk-server

0
Critical
VulnerabilityCVE-2026-33950cvecve-2026-33950cwe-285cwe-288cwe-862
Published: Thu Apr 02 2026 (04/02/2026, 16:08:59 UTC)
Source: CVE Database V5
Vendor/Project: SignalK
Product: signalk-server

Description

CVE-2026-33950 is a critical privilege escalation vulnerability in SignalK signalk-server versions prior to 2. 24. 0-beta. 4. An unauthenticated attacker can exploit an improper authorization flaw via the /enableSecurity endpoint to gain full Administrator access. This allows modification of sensitive vessel routing data, alteration of server configurations, and access to restricted endpoints. The vulnerability is due to improper authorization checks (CWE-285) and lack of authentication (CWE-862). It has a CVSS score of 9. 4, indicating high severity with network attack vector and no user interaction required. The issue has been patched in version 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 16:38:19 UTC

Technical Analysis

SignalK signalk-server is a server application deployed on central hubs in boats to manage and distribute vessel data. Prior to version 2.24.0-beta.4, the server contains a critical security vulnerability identified as CVE-2026-33950, classified under CWE-285 (Improper Authorization), CWE-288 (Authentication Bypass), and CWE-862 (Missing Authorization). The flaw exists in the /enableSecurity endpoint, which lacks proper authorization controls, allowing an unauthenticated attacker to escalate privileges by injecting the Admin role. This unauthorized access grants the attacker full administrative privileges, enabling them to modify sensitive vessel routing information, alter server configurations, and access restricted API endpoints. The vulnerability can be exploited remotely over the network without any user interaction or prior authentication, making it highly dangerous. The CVSS v3.1 base score is 9.4, reflecting the critical impact on confidentiality and integrity, with a low attack complexity and no privileges required. The vulnerability was publicly disclosed and patched in version 2.24.0-beta.4. While no active exploits have been reported, the potential for severe operational disruption and data compromise on maritime vessels is significant.

Potential Impact

The exploitation of this vulnerability can have severe consequences for maritime organizations relying on SignalK signalk-server. Attackers gaining administrator access can manipulate vessel routing data, potentially causing navigation errors or collisions. Altered server configurations could disable security features or enable persistent backdoors, compromising vessel safety and operational integrity. Unauthorized access to restricted endpoints may expose sensitive operational data or enable further lateral movement within the vessel's network. The disruption or manipulation of vessel data can lead to financial losses, safety hazards, regulatory non-compliance, and reputational damage. Given the critical nature of maritime navigation and communication systems, this vulnerability poses a high risk to the confidentiality, integrity, and availability of vessel operations worldwide.

Mitigation Recommendations

Organizations should immediately upgrade all instances of signalk-server to version 2.24.0-beta.4 or later, where the vulnerability is patched. Until upgrades can be performed, restrict network access to the signalk-server, especially the /enableSecurity endpoint, by implementing network segmentation and firewall rules limiting access to trusted personnel and systems only. Employ intrusion detection systems to monitor for unusual access patterns targeting the server. Conduct thorough audits of server configurations and logs to detect any unauthorized changes or access attempts. Additionally, implement strong authentication and authorization controls at the network perimeter and within the vessel's IT infrastructure to reduce exposure. Regularly update and patch all maritime software components and maintain an incident response plan tailored to maritime cybersecurity incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-24T19:50:52.105Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ce9803e6bfc5ba1dea5ac9

Added to database: 4/2/2026, 4:23:31 PM

Last enriched: 4/2/2026, 4:38:19 PM

Last updated: 4/2/2026, 7:02:45 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses