BrightSign Players (Update A)
Multiple vulnerabilities (CVE-2025-3925 and CVE-2025-54756) in BrightSign OS series 4 and 5 players allow privilege escalation, exploitation of easily-guessable passwords, or arbitrary code execution on the underlying operating system. The vulnerabilities stem from execution with unnecessary privileges (CWE-250) and use of default passwords (CWE-1392). BrightSign has released firmware patches v8.5.53.1 for series 4 and v9.0.166 for series 5 players. Mitigation includes changing default passwords, disabling the local DWS and unnecessary SSH/telnet services, restricting physical access, and disabling unused SD/USB ports.
- Physical access to the BrightSign player device
- Default or weak credentials left unchanged
- SSH/telnet server enabled (disabled by default but can be configured)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1fa04343-dea1-45e1-90c6-0c974f4064d9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.