Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
CVSS
No CVSS.
References
Configurations
No configuration.
History
24 Oct 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-24 23:15
Updated : 2025-10-24 23:15
NVD link : CVE-2025-34503
Mitre link : CVE-2025-34503
CVE.ORG link : CVE-2025-34503
JSON object : View
Products Affected
No product.
