Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-68620

Опубликовано: 01 янв. 2026
Источник: nvd
CVSS3: 9.1
EPSS Низкий

Описание

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-based request enumeration with unauthenticated polling of access request status. The first is Unauthenticated WebSocket Request Enumeration: When a WebSocket client connects to the SignalK stream endpoint with the serverevents=all query parameter, the server sends all cached server events including ACCESS_REQUEST events that contain details about pending access requests. The startServerEvents function iterates over app.lastServerEvents and writes each cached event to any connected client without verifying authorization level. Since WebSocket connections are allowed for readonly users (which includes unauthenticated users when allow_readonly is true), attackers receive these events containing request IDs, client identifiers, descr

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
Версия до 2.19.0 (исключая)
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta1:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta2:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta3:*:*:*:*:*:*
cpe:2.3:a:signalk:signal_k_server:2.19.0:beta4:*:*:*:*:*:*

EPSS

Процентиль: 32%
0.00123
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-288

Связанные уязвимости

CVSS3: 9.1
github
около 1 месяца назад

Signal K Server vulnerable to JWT Token Theft via WebSocket Enumeration and Unauthenticated Polling

EPSS

Процентиль: 32%
0.00123
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-288