CVE-2025-63895
issue · issue Multiple Products, specifically JXL 9 Inch Car Android Double Din Player
A high-severity vulnerability has been identified in the Bluetooth firmware of specific JXL car Android players.
Executive summary
A high-severity vulnerability has been identified in the Bluetooth firmware of specific JXL car Android players. An unauthenticated attacker within Bluetooth range could exploit this flaw to execute arbitrary code, potentially gaining full control of the infotainment system, accessing sensitive data, or causing the device to become unresponsive. Organizations using these devices should prioritize applying the vendor-supplied security update to mitigate the risk of compromise.
Vulnerability
This vulnerability is an issue within the Bluetooth firmware stack that handles incoming connection packets. An unauthenticated attacker in close physical proximity (within Bluetooth range) can send a specially crafted series of Bluetooth packets to an affected device. This can trigger a buffer overflow condition, allowing the attacker to execute arbitrary code with system-level privileges on the Android head unit, bypassing standard security mechanisms.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to significant business impact, including the compromise of sensitive data stored on or accessed by the device, such as paired phone contacts, call history, location data, and credentials for connected accounts. An attacker could manipulate the device's functionality, potentially causing driver distraction, or use the compromised head unit as a pivot point to attack other connected devices. The primary risks include data breach, loss of system integrity, and reputational damage if the devices are part of a corporate fleet or managed environment.
Remediation
Immediate Action: Apply vendor security updates immediately. The vendor has released a firmware patch to address this vulnerability. This is the most effective way to mitigate the risk. After patching, organizations should monitor for any signs of post-remediation exploitation attempts and review system and access logs for any anomalous activity preceding the update.
Proactive Monitoring: Security teams should monitor for unusual Bluetooth activity, such as repeated or failed pairing attempts from unknown devices. Review system logs on the Android device for unexpected reboots, crashes of the Bluetooth service, or error messages related to the Bluetooth stack. If the device is connected to a network, monitor for unexpected outbound traffic.
Compensating Controls: If immediate patching is not feasible, the following controls can reduce the attack surface:
- Disable Bluetooth on the device when it is not actively in use.
- Ensure the device is not set to be permanently discoverable.
- Unpair any unknown or untrusted devices.
- Limit the physical accessibility of vehicles containing the affected devices.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity rating (CVSS 7.5) and the potential for complete device compromise, it is strongly recommended that organizations prioritize the immediate identification and patching of all affected JXL Android players. Although there is no evidence of active exploitation in the wild, the risk of a targeted attack remains significant. A comprehensive inventory and a swift patching schedule should be implemented to fully mitigate this vulnerability.