Signal K Server DoS: Unauthenticated ReDoS Attack Hits Marine Systems
The National Vulnerability Database has disclosed CVE-2026-39320, a high-severity (CVSS 7.5) unauthenticated Regular Expression Denial of Service (ReDoS) vulnerability impacting Signal K Server versions prior to 2.25.0. This server application, commonly found on boats as a central hub for marine data, is susceptible via its WebSocket subscription handling logic.
Attackers can exploit this by injecting unescaped regex metacharacters into the context parameter of a stream subscription. This forces the server’s Node.js event loop into a catastrophic backtracking loop when processing long string identifiers, such as the server’s own UUID. The result is a complete Denial of Service, with the server CPU spiking to 100% and becoming unresponsive to all API and socket requests.
This isn’t just a nuisance; it’s a critical operational risk for any vessel relying on Signal K. An unauthenticated DoS means an attacker doesn’t need prior access or credentials. For defenders, this means immediate patching is non-negotiable. Version 2.25.0 contains the fix, so prioritize this update to prevent total system outages on affected marine platforms.
What This Means For You
- If your organization operates or manages marine systems utilizing Signal K Server, you must immediately verify your version. Patching to version 2.25.0 or newer is critical to prevent unauthenticated Denial of Service attacks that can completely incapacitate your central marine data hub.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-39320: Signal K Server WebSocket Subscription ReDoS Exploit Attempt
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-39320 | DoS | Signal K Server versions prior to 2.25.0 |
| CVE-2026-39320 | DoS | Unauthenticated Regular Expression Denial of Service (ReDoS) |
| CVE-2026-39320 | DoS | WebSocket subscription handling logic, 'context' parameter |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 04:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.