CVE-2025-67780

4.2 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers on the same local network as a Starlink Dish to execute administrative actions via gRPC requests by bypassing cross-origin protections. Attackers can also read dish orientation data which could help infer the dish's geographical location. Affected users are those with Starlink Dish devices running vulnerable firmware on their local networks.

💻 Affected Systems

Products:
  • SpaceX Starlink Dish
Versions: Firmware 2024.12.04.mr46620 (specifically mentioned for Mini1_prod2)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects Mini1_prod2 dish model, but similar models with same firmware likely vulnerable. Requires attacker on same LAN as dish.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain administrative control over the dish, potentially disrupting service, modifying configurations, or using orientation data to physically locate the device.

🟠

Likely Case

Local network attackers can execute unauthorized administrative commands and collect dish positioning data that reveals approximate location information.

🟢

If Mitigated

With proper network segmentation and access controls, the attack surface is limited to authorized local network segments only.

🌐 Internet-Facing: LOW - The vulnerability requires local network access to the dish's gRPC interface.
🏢 Internal Only: MEDIUM - Any attacker on the local network can exploit this without authentication, but requires specific knowledge of the gRPC interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public research demonstrates exploitation via gRPC requests without authentication. Attack requires network access and knowledge of gRPC endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE_KNOWN

Restart Required: No

Instructions:

1. Monitor SpaceX/Starlink for firmware updates. 2. When available, update dish firmware through official Starlink app. 3. Verify firmware version after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Starlink Dish on separate VLAN or network segment to limit access to trusted devices only.

Firewall Rules

all

Block access to dish gRPC ports (typically 9200) from untrusted network segments.

🧯 If You Can't Patch

  • Segment dish network from general user networks
  • Monitor network traffic for gRPC requests to dish from unauthorized sources

🔍 How to Verify

Check if Vulnerable:

Check dish firmware version in Starlink app. If version is 2024.12.04.mr46620 or similar, device is vulnerable.

Check Version:

Check via Starlink mobile app: Settings > Advanced > Debug Data > Look for 'dishSwVersion'

Verify Fix Applied:

Verify firmware version has been updated to a version newer than 2024.12.04.mr46620.

📡 Detection & Monitoring

Log Indicators:

  • Unusual gRPC requests to dish on port 9200
  • Multiple failed authentication attempts to dish services

Network Indicators:

  • gRPC traffic to dish from unauthorized IP addresses
  • HTTP requests without Referer headers to dish endpoints

SIEM Query:

source_ip NOT IN (trusted_ips) AND dest_port=9200 AND protocol=gRPC

🔗 References

📤 Share & Export