Description
Deck Mate 2 lacks a verified secure-boot chain and runtime integrity validation for its controller and display modules. Without cryptographic boot verification, an attacker with physical access can modify or replace the bootloader, kernel, or filesystem and gain persistent code execution on reboot. This weakness allows long-term firmware tampering that survives power cycles. The vendor indicates that more recent firmware updates strengthen update-chain integrity and disable physical update ports to mitigate related attack avenues.
Problem types
CWE-1326 Missing Immutable Root of Trust in Hardware
Product status
Any version before all known versions prior to 2025-10-23
Credits
Joseph Tartaro of IOActive
Enrique Nissim of IOActive
Ethan Shackelford of IOActive
References
www.ioactive.com/...5/05/IOActive-card-shuffler-security.pdf
www.vulncheck.com/...-master-deck-mate-2-missing-secure-boot