CVE-2025-67780

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.
Configurations

No configuration.

History

12 Dec 2025, 00:15

Type Values Removed Values Added
Summary (en) SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish. (en) SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

11 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-11 23:15

Updated : 2025-12-12 15:17


NVD link : CVE-2025-67780

Mitre link : CVE-2025-67780

CVE.ORG link : CVE-2025-67780


JSON object : View

Products Affected

No product.

CWE
CWE-306

Missing Authentication for Critical Function