Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54756: CWE-1392 in BrightSign BrightSign OS series 4 players

0
High
VulnerabilityCVE-2025-54756cvecve-2025-54756cwe-1392
Published: Thu Feb 12 2026 (02/12/2026, 16:34:18 UTC)
Source: CVE Database V5
Vendor/Project: BrightSign
Product: BrightSign OS series 4 players

Description

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. The latest release fixes this issue for new installations; users of old installations are encouraged to change all default passwords.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 18:44:58 UTC

Technical Analysis

CVE-2025-54756 identifies a critical security vulnerability in BrightSign OS series 4 and 5 players, which are widely used digital signage media players. The root cause is the use of a default password that is guessable when an attacker has knowledge of the device information, such as serial numbers or device-specific identifiers. This vulnerability is classified under CWE-1392, indicating improper default credential management. The CVSS 3.1 base score of 8.4 reflects its high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability (all rated high), meaning an attacker can fully compromise the device, potentially gaining administrative access, altering content, or disrupting service. BrightSign has addressed this issue in newer firmware releases (series 4 v8.5.53.1 and series 5 v9.0.166), which remove or secure default credentials for new installations. However, legacy devices remain vulnerable unless users manually change default passwords. No public exploits have been reported yet, but the simplicity of guessing default credentials makes exploitation feasible in environments where attackers can access the device network or physical location.

Potential Impact

The vulnerability poses a significant risk to organizations using BrightSign OS series 4 and 5 players, especially in sectors relying heavily on digital signage such as retail, transportation, hospitality, and corporate environments. Successful exploitation could lead to unauthorized control over signage content, enabling attackers to display malicious or misleading information, disrupt business operations, or use compromised devices as pivot points within internal networks. Confidential data stored or transmitted by the devices could be exposed or altered. The availability of the signage service may be interrupted, causing reputational damage and financial loss. Given the low complexity and no authentication requirements, attackers with local or network access can exploit this vulnerability easily. This risk is amplified in large deployments where manual password changes may be inconsistent or overlooked. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the potential for future attacks.

Mitigation Recommendations

Organizations should immediately upgrade BrightSign OS series 4 players to version 8.5.53.1 or later and series 5 players to version 9.0.166 or later to eliminate the default password vulnerability. For existing deployments where immediate patching is not feasible, administrators must change all default passwords to strong, unique credentials to prevent unauthorized access. Network segmentation should be implemented to isolate BrightSign devices from critical infrastructure and limit local network access. Physical security controls should restrict unauthorized personnel from accessing the devices. Monitoring and logging access attempts to these devices should be enabled to detect suspicious activity. Additionally, organizations should audit their device inventories to identify all affected BrightSign players and verify their firmware versions and password configurations. Regular vulnerability assessments and penetration testing targeting these devices can help ensure ongoing security compliance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-07-30T19:03:10.145Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698e080ec9e1ff5ad8f198c4

Added to database: 2/12/2026, 5:04:14 PM

Last enriched: 2/19/2026, 6:44:58 PM

Last updated: 3/29/2026, 9:34:53 PM

Views: 219

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses