First published: Wed May 07 2025(Updated: )
BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 contain an execution with unnecessary privileges vulnerability, allowing for privilege escalation on the device once code execution has been obtained.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
BrightSign OS | <8.5.53.1 | 8.5.53.1 |
BrightSign OS series 5 players | <9.0.166 | 9.0.166 |
BrightSign fixed CVE-2025-3925 https://www.cve.org/CVERecord in v8.5.53.1 (for series 4 players) and v9.0.166 (for series 5 players). Both of these have been released and available on the BrightSign download site. https://www.brightsign.biz/resources/software-downloads/ For more information, please contact BrightSign via their website. https://www.brightsign.biz/contact-us/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3925 has a high severity level due to its potential for privilege escalation on affected BrightSign devices.
To mitigate CVE-2025-3925, update BrightSign OS series 4 players to version 8.5.53.1 or BrightSign OS series 5 to version 9.0.166.
CVE-2025-3925 affects BrightSign OS series 4 prior to version 8.5.53.1 and series 5 prior to version 9.0.166.
Exploitation of CVE-2025-3925 requires local code execution, as it specifically pertains to privilege escalation on the device.
Affected devices include BrightSign OS series 4 and series 5 players with versions prior to the specified update releases.