CVE-2025-59408
BaseFortify
Publication date: 2025-09-25
Last updated on: 2025-10-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flocksafety | bravo_compute_box_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Flock Safety Bravo Edge AI Compute Device BRAVO_00.00_local_20241017 has Secure Boot disabled, which means an attacker can flash modified firmware onto the device without any cryptographic protections, potentially compromising the device's integrity.
How can this vulnerability impact me? :
This vulnerability allows an attacker to install unauthorized firmware on the device, which could lead to device compromise, unauthorized access, or manipulation of the device's functions.
What immediate steps should I take to mitigate this vulnerability?
Since the device ships with Secure Boot disabled, an immediate mitigation step is to enable Secure Boot if possible to prevent unauthorized firmware flashing. If enabling Secure Boot is not supported, restrict physical and network access to the device to prevent attackers from flashing modified firmware.