CVE-2025-65396
📋 TL;DR
A physical access vulnerability in Blurams Flare Camera allows attackers to hijack the boot process via UART interface by shorting SPI flash memory pins. This enables firmware extraction and disclosure of cryptographic keys and user configurations. Only users of affected camera versions with physical device access are impacted.
💻 Affected Systems
- Blurams Flare Camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete firmware compromise leading to cryptographic key theft, persistent device control, and exposure of all user data and camera feeds.
Likely Case
Local attacker extracts firmware to analyze for additional vulnerabilities, potentially enabling remote exploitation or credential harvesting.
If Mitigated
With physical security controls, impact limited to isolated device compromise without network propagation.
🎯 Exploit Status
Exploitation requires physical tampering skills and specific timing during boot sequence.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Monitor Blurams website for firmware updates addressing boot process security.
🔧 Temporary Workarounds
Physical Security Hardening
allSecure device in tamper-resistant enclosures to prevent physical access to UART and SPI components.
Boot Process Monitoring
allImplement monitoring for abnormal boot sequences or UART access attempts.
🧯 If You Can't Patch
- Deploy cameras in physically secure locations with restricted access
- Implement network segmentation to isolate cameras from sensitive systems
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera settings or web interface. If version is 24.1114.151.929 or earlier, device is vulnerable.
Check Version:
Check camera web interface or mobile app for firmware version information.
Verify Fix Applied:
Verify firmware version has been updated beyond 24.1114.151.929 through official Blurams channels.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed boot attempts
- UART interface activation logs
- Abnormal boot timing
Network Indicators:
- Unusual firmware update requests
- Suspicious outbound connections post-boot
SIEM Query:
Device:Blurams AND (Event:boot_failure OR Interface:UART)