Home

Description

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotation, and elevation data via gRPC can make it easier to infer the geographical location of the dish.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2025-12-12 | Assigner mitre




MEDIUM: 4.2CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

2024.12.04.mr46620 (custom) before 21.08.24
affected

References

www.akawlabs.com/blog/starlink-grpc-execution

cve.org (CVE-2025-67780)

nvd.nist.gov (CVE-2025-67780)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.