{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68273","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-12-16T14:05:31.364Z","datePublished":"2026-01-01T18:21:51.678Z","dateUpdated":"2026-01-02T18:56:08.422Z"},"containers":{"cna":{"title":"Signal K Server Vulnerable to Unauthenticated Information Disclosure via Exposed Endpoints","problemTypes":[{"descriptions":[{"cweId":"CWE-200","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/SignalK/signalk-server/security/advisories/GHSA-fpf5-w967-rr2m"},{"name":"https://github.com/SignalK/signalk-server/releases/tag/v2.19.0","tags":["x_refsource_MISC"],"url":"https://github.com/SignalK/signalk-server/releases/tag/v2.19.0"}],"affected":[{"vendor":"SignalK","product":"signalk-server","versions":[{"version":"< 2.19.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-01T18:40:25.139Z"},"descriptions":[{"lang":"en","value":"Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data schema, connected serial devices, and installed analyzer tools. This exposure facilitates reconnaissance for further attacks. Version 2.19.0 patches the issue."}],"source":{"advisory":"GHSA-fpf5-w967-rr2m","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-02T18:55:48.224636Z","id":"CVE-2025-68273","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-02T18:56:08.422Z"}}]}}