Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

0
Critical
VulnerabilityCVE-2025-11543cvecve-2025-11543cwe-354
Published: Mon Dec 22 2025 (12/22/2025, 05:09:48 UTC)
Source: CVE Database V5
Vendor/Project: Sharp Display Solutions, Ltd.
Product: NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Description

Improper Validation of Integrity Check Value vulnerability in Sharp Display Solutions projectors allows a attacker may create and run unauthorized firmware.

AI-Powered Analysis

AILast updated: 12/22/2025, 06:25:47 UTC

Technical Analysis

CVE-2025-11543 identifies a critical security vulnerability in multiple models of Sharp Display Solutions projectors, including NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, and many others. The root cause is an improper validation of the integrity check value during the firmware update process, classified under CWE-354. This weakness allows an attacker to craft and deploy unauthorized firmware images that the device will accept and execute without proper verification. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N). The impact is severe, affecting confidentiality, integrity, and availability at a high level, potentially allowing attackers to take full control of the projector, manipulate data, disrupt operations, or use the device as a foothold for further network intrusion. The affected products encompass a broad range of Sharp projectors used in corporate, educational, and governmental environments. No patches or firmware updates have been published yet, and no exploits are known to be active in the wild, but the critical nature of the flaw demands urgent attention. The vulnerability's exploitation could be leveraged in targeted attacks against organizations relying on these devices for presentations or secure communications, especially where projectors are network-connected and accessible.

Potential Impact

For European organizations, the impact of CVE-2025-11543 is significant due to the widespread use of Sharp projectors in corporate offices, educational institutions, government facilities, and critical infrastructure. Unauthorized firmware execution can lead to complete device compromise, enabling attackers to intercept or manipulate displayed content, disrupt meetings or presentations, and potentially pivot to internal networks if the projector is connected to sensitive environments. Confidential information presented via these devices could be leaked or altered, undermining data integrity and confidentiality. Availability could also be affected if attackers disable or brick the projectors, causing operational disruptions. The risk is heightened in sectors such as finance, defense, and public administration, where secure and reliable AV equipment is essential. Additionally, the lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks if network access is possible. The absence of patches further exacerbates the threat landscape for affected organizations.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Sharp projectors from critical network segments and restrict access to their management interfaces using firewalls and VLANs. 2. Implement strict access controls: Limit network access to projector management ports to authorized personnel only, using IP whitelisting and strong authentication mechanisms where possible. 3. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous firmware update attempts or unauthorized communications with projector devices. 4. Vendor engagement: Urgently contact Sharp Display Solutions for firmware updates or official patches addressing the integrity validation flaw. 5. Firmware update policies: Until patches are available, disable remote firmware updates or restrict update capabilities to trusted environments. 6. Physical security: Ensure projectors are physically secured to prevent local tampering or unauthorized connections. 7. Incident response readiness: Prepare to respond to potential compromise by maintaining backups of projector configurations and monitoring for signs of exploitation. 8. Awareness and training: Educate IT and security teams about this vulnerability and the importance of securing AV equipment within the enterprise environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NEC
Date Reserved
2025-10-09T06:46:42.281Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948e1f1f380eec6877c45d4

Added to database: 12/22/2025, 6:15:13 AM

Last enriched: 12/22/2025, 6:25:47 AM

Last updated: 12/22/2025, 8:22:33 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats