Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/SignalK/signalk-server/releases/tag/v2.19.0 | Release Notes |
| https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m | Exploit Vendor Advisory |
Configurations
History
06 Jan 2026, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Signalk
Signalk signal K Server |
|
| References | () https://github.com/SignalK/signalk-server/releases/tag/v2.19.0 - Release Notes | |
| References | () https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m - Exploit, Vendor Advisory |
01 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-01 19:15
Updated : 2026-01-06 17:58
NVD link : CVE-2025-68273
Mitre link : CVE-2025-68273
CVE.ORG link : CVE-2025-68273
JSON object : View
Products Affected
signalk
- signal_k_server
CWE
