Description
Deck Mate 1 executes firmware directly from an external EEPROM without verifying authenticity or integrity. An attacker with physical access can replace or reflash the EEPROM to run arbitrary code that persists across reboots. Because this design predates modern secure-boot or signed-update mechanisms, affected systems should be physically protected or retired from service. The vendor has not indicated that firmware updates are available for this legacy model.
Problem types
CWE-347 Improper Verification of Cryptographic Signature
CWE-1326 Missing Immutable Root of Trust in Hardware
Product status
Any version before unknown
Credits
Joseph Tartaro of IOActive
Enrique Nissim of IOActive
Ethan Shackelford of IOActive
References
www.ioactive.com/...5/05/IOActive-card-shuffler-security.pdf
www.vulncheck.com/...authenticated-eeprom-firmware-execution