Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-58hv-vhq9-gfvr

Опубликовано: 12 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 4.2

Описание

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

EPSS

Процентиль: 7%
0.00026
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 4.2
nvd
около 2 месяцев назад

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

EPSS

Процентиль: 7%
0.00026
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-306