Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Shuffle Master
Shuffle Master deck Mate 1
Vendors & Products Shuffle Master
Shuffle Master deck Mate 1

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Oct 2025 23:15:00 +0000

Type Values Removed Values Added
Description Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
Title Shuffle Master Deck Mate 1 Unauthenticated EEPROM Firmware Execution
Weaknesses CWE-1326
CWE-347
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-24T23:04:43.922Z

Updated: 2025-10-27T15:57:36.604Z

Reserved: 2025-04-15T19:15:22.611Z

Link: CVE-2025-34503

cve-icon Vulnrichment

Updated: 2025-10-27T15:38:40.543Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-24T23:15:47.120

Modified: 2025-10-27T13:20:15.637

Link: CVE-2025-34503

cve-icon Redhat

No data.