CVE-2026-2754
Published: 06 March 2026
Summary
CVE-2026-2754 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Cydome (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.
Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.
Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.
Guarantees critical functions are protected by mandatory invocation of the access control mechanism.
Auditing sessions makes it possible to detect access to critical functions without required authentication.
The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.
Certification assesses that critical functions have required authentication controls in place.
Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing auth on public HTTP API (port 8080) directly enables T1190 for initial remote access; retrieved config/OT/network data directly facilitates T1005 (local system data), T1082 (system info), and T1016 (network config discovery).
NVD Description
Navtor NavBox exposes sensitive configuration and operational data due to missing authentication on HTTP API endpoints. An unauthenticated remote attacker with network access to the device can execute HTTP GET requests to TCP port 8080 to retrieve internal network parameters…
more
including ECDIS & OT Information, device identifiers, and service status logs.
Deeper analysisAI
CVE-2026-2754 is a missing authentication vulnerability (CWE-306) in Navtor NavBox version 4.12.0.3, where HTTP API endpoints on TCP port 8080 lack proper authentication controls. This exposure allows access to sensitive configuration and operational data, including internal network parameters, ECDIS and OT information, device identifiers, and service status logs. Published on 2026-03-06, the vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting its high confidentiality impact with network-wide attack complexity.
An unauthenticated remote attacker with network access to the affected device can exploit this vulnerability by sending HTTP GET requests to the exposed API endpoints on port 8080. Successful exploitation enables retrieval of the sensitive data without requiring privileges, user interaction, or scope changes, potentially compromising operational technology environments in maritime settings.
Mitigation details are outlined in advisories from Cydome at https://cydome.io/vulnerability-advisory-cve-2026-2754-in-navtor-navbox-version-4-12-0-3 and Navtor's vendor statement at https://www.navtor.com/navtor-vendor-statement. Security practitioners should consult these resources for patching instructions, workarounds, and affected version confirmations.
Details
- CWE(s)