CVE Vulnerabilities

CVE-2025-34500

Use of Hard-coded Cryptographic Key

Published: Oct 24, 2025 | Modified: Oct 24, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Deck Mate 2s firmware update mechanism accepts packages without cryptographic signature verification, encrypts them with a single hard-coded AES key shared across devices, and uses a truncated HMAC for integrity validation. Attackers with access to the update interface - typically via the units USB update port - can craft or modify firmware packages to execute arbitrary code as root, allowing persistent compromise of the devices integrity and deck randomization process. Physical or on-premises access remains the most likely attack path, though network-exposed or telemetry-enabled deployments could theoretically allow remote exploitation if misconfigured. The vendor confirmed that firmware updates have been issued to correct these update-chain weaknesses and that USB update access has been disabled on affected units.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Potential Mitigations

References