BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or
series 5 prior to v9.0.166 contain an execution with unnecessary
privileges vulnerability, allowing for privilege escalation on the
device once code execution has been obtained.
Fixes

Solution

BrightSign fixed CVE-2025-3925 https://www.cve.org/CVERecord in v8.5.53.1 (for series 4 players) and v9.0.166 (for series 5 players). Both of these have been released and available on the BrightSign download site. https://www.brightsign.biz/resources/software-downloads/ For more information, please contact BrightSign via their website. https://www.brightsign.biz/contact-us/


Workaround

BrightSign recommends the following security practices: * Change default passwords when the device is initially set up. * Disable the local DWS as described in "High Security settings". * Disable the SSH/telnet server when not being used - it is not enabled by default. * Devices should be located where an attacker does not have physical access to the device. * SD and USB ports can be disabled if not needed. For more information, please contact BrightSign via their website. https://www.brightsign.biz/contact-us/

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}

epss

{'score': 0.0002}


Thu, 08 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 20:30:00 +0000

Type Values Removed Values Added
Description BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 contain an execution with unnecessary privileges vulnerability, allowing for privilege escalation on the device once code execution has been obtained.
Title BrightSign Players Execution with Unnecessary Privileges
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-08T14:04:48.853Z

Reserved: 2025-04-24T17:54:29.059Z

Link: CVE-2025-3925

cve-icon Vulnrichment

Updated: 2025-05-08T14:04:45.517Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-07T21:16:03.897

Modified: 2025-05-08T14:39:09.683

Link: CVE-2025-3925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.