CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-68620
9.10.17%

Signal K: Sinking the Ship with a Leaky WebSocket

Alon Barad
Alon Barad
Software Engineer

Jan 2, 2026·7 min read·8 visits

PoC Available

Executive Summary (TL;DR)

Signal K Server broadcasted sensitive 'access request' events—including request IDs—to unauthenticated WebSocket clients. Coupled with a polling endpoint that returned plaintext JWTs upon request approval, this allowed attackers to passively snoop on legitimate login attempts and steal the resulting session tokens, granting full administrative control over the vessel's data server.

A critical authentication bypass in Signal K Server allows unauthenticated attackers to hijack administrative sessions. By listening to the public WebSocket stream for access request IDs and polling an insecure REST endpoint, attackers can steal valid JWTs the moment an administrator approves a legitimate device.

Official Patches

Signal KSignal K Server v2.19.0 Release Notes

Fix Analysis (1)

Technical Appendix

CVSS Score
9.1/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Probability
0.17%
Top 100% most exploited
2,500
Estimated exposed hosts via Shodan

Affected Systems

Signal K Server

Affected Versions Detail

Product
Affected Versions
Fixed Version
Signal K Server
Signal K
< 2.19.02.19.0
AttributeDetail
Attack VectorNetwork (WebSocket & REST)
CVSS v3.19.1 (Critical)
CWECWE-306 (Missing Authentication for Critical Function)
Exploit StatusPoC Available
ImpactFull Admin Compromise
PrerequisitesNone (Unauthenticated)

MITRE ATT&CK Mapping

T1078.003Valid Accounts: Local Accounts
Initial Access
T1589.002Gather Victim Identity Information
Reconnaissance
T1036.007Masquerading: IP Spoofing
Defense Evasion
CWE-306
Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

Known Exploits & Detection

Research AnalysisLogic flaw in event handling allows token recovery.

Vulnerability Timeline

Patch Committed (v2.19.0)
2025-01-20
CVE Published
2025-02-14

References & Sources

  • [1]Signal K Server Repository
Related Vulnerabilities
CVE-2025-69203

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.