CVE-2025-68273

Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*

History

06 Jan 2026, 17:58

Type Values Removed Values Added
CPE cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Signalk
Signalk signal K Server
References () https://github.com/SignalK/signalk-server/releases/tag/v2.19.0 - () https://github.com/SignalK/signalk-server/releases/tag/v2.19.0 - Release Notes
References () https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m - () https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m - Exploit, Vendor Advisory

01 Jan 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-01 19:15

Updated : 2026-01-06 17:58


NVD link : CVE-2025-68273

Mitre link : CVE-2025-68273

CVE.ORG link : CVE-2025-68273


JSON object : View

Products Affected

signalk

  • signal_k_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo