Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34501: CWE-798 Use of Hard-coded Credentials in Light & Wonder, Inc. / SHFL Entertainment, Inc. / Shuffle Master, Inc. Deck Mate 2

0
High
VulnerabilityCVE-2025-34501cvecve-2025-34501cwe-798
Published: Mon Nov 03 2025 (11/03/2025, 21:56:54 UTC)
Source: CVE Database V5
Vendor/Project: Light & Wonder, Inc. / SHFL Entertainment, Inc. / Shuffle Master, Inc.
Product: Deck Mate 2

Description

Deck Mate 2 is distributed with static, hard-coded credentials for the root shell and web user interface, while multiple management services (SSH, HTTP, Telnet, SMB, X11) are enabled by default. If an attacker can reach these interfaces - most often through local or near-local access such as connecting to the USB or Ethernet ports beneath the table - the built-in credentials permit administrative login and full control of the system. Once authenticated, an attacker can access firmware utilities, modify controller software, and establish persistent compromise. Remote attack paths via network, cellular, or telemetry links may exist in specific configurations but generally require additional capabilities or operator error. The vendor reports that USB access has been disabled in current firmware builds.

AI-Powered Analysis

AILast updated: 11/10/2025, 23:55:19 UTC

Technical Analysis

CVE-2025-34501 identifies a critical security weakness in the Deck Mate 2 device, a product by Light & Wonder, Inc. (formerly SHFL Entertainment, Inc. / Shuffle Master, Inc.). The vulnerability stems from the use of hard-coded, static credentials embedded in the device firmware for both root shell and web user interface access. These credentials are not unique per device and cannot be changed by operators, violating secure credential management best practices (CWE-798). The device runs multiple management services by default, including SSH, HTTP, Telnet, SMB, and X11, all accessible via local or near-local network interfaces such as USB or Ethernet ports typically located beneath gaming tables. An attacker who gains physical or near-physical access to these ports can use the hard-coded credentials to log in with administrative privileges without needing any user interaction or prior authentication. Once inside, the attacker can manipulate firmware utilities, alter controller software, and establish persistent backdoors or other malicious modifications. Although remote attack vectors via network, cellular, or telemetry links may exist in specific configurations, these generally require additional attacker capabilities or operator errors, making remote exploitation less straightforward. The vendor has responded by disabling USB access in current firmware versions, reducing the attack surface. The vulnerability carries a CVSS 4.0 score of 7.0, indicating high severity due to the potential for full system compromise, but it requires physical or near-physical access, limiting the attack scope. No public exploits have been reported yet, but the risk remains significant for environments where physical access controls are weak.

Potential Impact

For European organizations, particularly those in the gaming, casino, and entertainment sectors using Deck Mate 2 devices, this vulnerability poses a substantial risk. Exploitation can lead to complete system compromise, allowing attackers to manipulate game outcomes, disrupt operations, or steal sensitive operational data. This undermines the integrity and availability of gaming systems, potentially causing financial losses, regulatory penalties, and reputational damage. Given the physical access requirement, venues with less stringent physical security or high foot traffic are at greater risk. Additionally, persistent compromise could facilitate long-term fraud or espionage. The presence of multiple enabled management services increases the attack surface. Remote exploitation is less likely but cannot be fully discounted in complex networked environments, especially where telemetry or cellular links are used. European regulators and operators focused on compliance with standards like GDPR and PCI DSS may face additional scrutiny if such vulnerabilities are exploited, as they could lead to data breaches or operational failures.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic advice: 1) Immediately update to the latest firmware versions where USB access is disabled and any patches are applied. 2) Physically secure all Deck Mate 2 devices, especially the USB and Ethernet ports beneath tables, using tamper-evident seals, locked enclosures, or restricted access areas. 3) Disable or restrict unnecessary management services (SSH, Telnet, SMB, X11) if possible, or isolate them on segmented networks with strict access controls. 4) Conduct regular audits and penetration tests focusing on physical security and device interfaces to detect unauthorized access attempts. 5) Implement network segmentation to separate gaming device networks from corporate or public networks, minimizing remote attack vectors. 6) Monitor device logs and network traffic for unusual activity indicative of compromise or unauthorized access. 7) Train staff on the risks of physical access attacks and enforce strict access policies. 8) Engage with the vendor for any forthcoming patches or guidance and consider alternative devices if risk cannot be adequately mitigated. 9) Maintain incident response plans tailored to physical and firmware compromise scenarios. 10) Collaborate with regulatory bodies to ensure compliance and share threat intelligence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690929a9fe7723195e0fd62f

Added to database: 11/3/2025, 10:16:09 PM

Last enriched: 11/10/2025, 11:55:19 PM

Last updated: 12/20/2025, 5:39:21 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats