Ad

CVE-2026-33951

MEDIUM CVSS 4.0: 6.9 EPSS 0.07%
Updated Apr 06, 2026
Signalk
Parameter Value
CVSS 6.9 (MEDIUM)
Affected Versions before 2.24.0
Fixed In 2.24.0
Type CWE-306 (Missing Authentication for Critical Function), CWE-284 (Improper Access Control)
Vendor Signalk
Public PoC No

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration.

As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Signalk Signal_K_Server
cpe:2.3:a:signalk:signal_k_server:*:*:*:*:*:*:*:*
2.24.0