Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 24 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model. | |
| Title | Shuffle Master Deck Mate 1 Unauthenticated EEPROM Firmware Execution | |
| Weaknesses | CWE-1326 CWE-347 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-24T23:04:43.922Z
Reserved: 2025-04-15T19:15:22.611Z
Link: CVE-2025-34503
No data.
Status : Received
Published: 2025-10-24T23:15:47.120
Modified: 2025-10-24T23:15:47.120
Link: CVE-2025-34503
No data.
OpenCVE Enrichment
No data.