CVE-2025-36755

N/A Unknown

📋 TL;DR

The CleverDisplay BlueOne hardware player has a physical security vulnerability where removing its enclosure allows USB keyboard access during boot to view BIOS settings. This exposes internal system information but doesn't permit modification or system compromise. Only users who physically access and tamper with the device enclosure are affected.

💻 Affected Systems

Products:
  • CleverDisplay BlueOne hardware player
Versions: All versions with the described physical enclosure design
Operating Systems: Embedded system/BIOS level
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the physical design where USB ports are enclosed but accessible if enclosure is removed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could view BIOS configuration details, potentially revealing system information that could aid in further attacks, but cannot modify settings or compromise system integrity.

🟠

Likely Case

Minimal impact - requires physical tampering with the device enclosure to access USB ports, then viewing non-sensitive BIOS information without modification capability.

🟢

If Mitigated

No impact if physical security controls prevent enclosure removal and unauthorized physical access to devices.

🌐 Internet-Facing: LOW - This is a physical access vulnerability requiring direct manipulation of hardware.
🏢 Internal Only: LOW - Even with internal access, requires physical tampering with device enclosure to exploit.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical access to device, removal of protective enclosure, and timing to press ESC during boot sequence.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://csirt.divd.nl/DIVD-2025-00043

Restart Required: No

Instructions:

No software patch available. Physical design modification required by manufacturer.

🔧 Temporary Workarounds

Physical Security Enhancement

all

Implement physical security controls to prevent unauthorized access to device enclosures

Secure Physical Placement

all

Install devices in secure locations with restricted physical access

🧯 If You Can't Patch

  • Implement strict physical access controls to prevent tampering with device enclosures
  • Monitor physical access to devices and implement tamper-evident seals on enclosures

🔍 How to Verify

Check if Vulnerable:

Check if device has physically enclosed USB ports that could be accessed by removing the enclosure

Check Version:

N/A - hardware design issue, not software version dependent

Verify Fix Applied:

Verify manufacturer has redesigned physical enclosure to prevent USB port access

📡 Detection & Monitoring

Log Indicators:

  • Physical access logs showing unauthorized entry to device locations
  • Tamper detection system alerts

Network Indicators:

  • N/A - physical access vulnerability

SIEM Query:

N/A - physical security event monitoring rather than network/SIEM detection

🔗 References

📤 Share & Export