{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "cveMetadata": {
    "cveId": "CVE-2025-36755",
    "assignerOrgId": "00000000-0000-4000-9000-000000000000",
    "requesterUserId": "00000000-0000-4000-9000-000000000000",
    "serial": 1,
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "00000000-0000-4000-9000-000000000000"
      },
      "title": "CleverDisplay BlueOne unauthorized BIOS access through physical USB keyboard",
      "datePublic": "2025-08-09T16:00:00.000Z",
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "cweId": "CWE-1244",
              "description": "CWE-1244: Internal Asset Exposed to Unsafe Debug Access Level or State",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "cweId": "CWE-1191",
              "description": "CWE-1191: On-Chip Debug and Test Interface With Improper Access Control",
              "type": "CWE"
            }
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-522",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-522 Malicious Hardware Component Replacement"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "CleverDisplay B.V.",
          "product": "BlueOne (CleverDisplay Hardware Player)",
          "modules": [
            "Enclosure / USB keyboard interface / BIOS & GRUB boot process"
          ],
          "versions": [
            {
              "status": "affected",
              "version": "12.11.1",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "12.12.1",
              "lessThanOrEqual": "*",
              "versionType": "semver"
            }
          ],
          "defaultStatus": "unknown"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The CleverDisplay BlueOne hardware player is designed with its USB interfaces physically enclosed and inaccessible under normal operating conditions. Researchers demonstrated that, after cicumventing the device’s protective enclosure, it was possible to connect a USB keyboard and press ESC during boot to access the BIOS setup interface. BIOS settings could be viewed but not modified. This behavior slightly increases the attack surface by exposing internal system information (CWE-1244) once the enclosure is removed, but does not allow integrity or availability compromise under standard or tested configurations.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "The CleverDisplay BlueOne hardware player is designed with its USB interfaces physically enclosed and inaccessible under normal operating conditions. Researchers demonstrated that, after cicumventing the device’s protective enclosure, it was possible to connect a USB keyboard and press <strong>ESC</strong> during boot to access the BIOS setup interface. BIOS settings could be viewed but not modified. This behavior slightly increases the attack surface by exposing internal system information (CWE-1244) once the enclosure is removed, but does not allow integrity or availability compromise under standard or tested configurations."
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://csirt.divd.nl/CVE-2025-5743/",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://csirt.divd.nl/DIVD-2025-00043",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV4_0": {
            "version": "4.0",
            "attackVector": "PHYSICAL",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "subConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "vulnAvailabilityImpact": "NONE",
            "subAvailabilityImpact": "NONE",
            "exploitMaturity": "NOT_DEFINED",
            "Safety": "NEGLIGIBLE",
            "Automatable": "NO",
            "Recovery": "NOT_DEFINED",
            "valueDensity": "DIFFUSE",
            "vulnerabilityResponseEffort": "LOW",
            "providerUrgency": "GREEN",
            "baseSeverity": "LOW",
            "baseScore": 2.4,
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/V:D/RE:L/U:Green"
          }
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "BlueOne firmware version 12.2.1 introduces default BIOS password protection and Secure Boot enablement, preventing unauthorized BIOS access.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "BlueOne firmware version 12.2.1 introduces default BIOS password protection and Secure Boot enablement, preventing unauthorized BIOS access."
            }
          ]
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Proof-of-concept demonstrated by researchers at WHY2025; exploitation confirmed limited to BIOS access without ability to modify settings.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Proof-of-concept demonstrated by researchers at WHY2025; exploitation confirmed limited to BIOS access without ability to modify settings.<br><br>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Alwin Warringa, Tom Dantuma, Ruben Meeuwissen, and Ramon Dunker.",
          "type": "finder"
        },
        {
          "lang": "en",
          "value": "Dennis Kussendrager (DIVD)",
          "type": "analyst"
        },
        {
          "lang": "en",
          "value": "Victor Pasman  (DIVD)",
          "type": "analyst"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  }
}