Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2104: CWE-306 Missing Authentication for Critical Function in JBL LIVE PRO 2 TWS

0
High
VulnerabilityCVE-2024-2104cvecve-2024-2104cwe-306
Published: Wed Dec 10 2025 (12/10/2025, 12:56:15 UTC)
Source: CVE Database V5
Vendor/Project: JBL
Product: LIVE PRO 2 TWS

Description

Due to improper BLE security configurations on the device's GATT server, an adjacent unauthenticated attacker can read and write device control commands through the mobile app service wich could render the device unusable.

AI-Powered Analysis

AILast updated: 12/10/2025, 13:30:58 UTC

Technical Analysis

CVE-2024-2104 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the JBL LIVE PRO 2 True Wireless Stereo (TWS) earbuds. The root cause lies in improper Bluetooth Low Energy (BLE) security configurations on the device's Generic Attribute Profile (GATT) server. Specifically, the device fails to enforce authentication for critical control commands exposed via the mobile app service over BLE. This allows an attacker in physical proximity (adjacent attacker) to connect to the earbuds without any authentication or user interaction and issue arbitrary read and write commands. Such unauthorized access can lead to manipulation of device functions, including disabling or rendering the earbuds unusable, thus impacting device availability. The CVSS 3.1 base score is 8.8 (high severity), reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects all versions of the LIVE PRO 2 TWS product. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a significant risk. The vulnerability highlights the importance of proper BLE security configurations, including enforcing authentication and authorization on GATT services that control device functionality.

Potential Impact

For European organizations, this vulnerability poses risks primarily in environments where JBL LIVE PRO 2 TWS earbuds are used for communication, audio playback, or other operational purposes. An attacker could disrupt employee communications by rendering devices unusable, causing productivity loss. Confidential information transmitted or stored on the device could be exposed or manipulated, impacting data confidentiality and integrity. The lack of authentication means attackers can exploit the vulnerability without prior access or user interaction, increasing the attack surface in shared or public spaces such as offices, conference rooms, or public transport. Critical sectors such as finance, government, and healthcare, where secure communications are essential, may face elevated risks. Additionally, the vulnerability could be leveraged as part of a broader attack chain targeting endpoint devices. The absence of known exploits currently limits immediate widespread impact, but the potential for future exploitation necessitates proactive mitigation.

Mitigation Recommendations

1. JBL should release a firmware update that properly enforces authentication and authorization on all BLE GATT server functions controlling device behavior. Users must apply these updates promptly. 2. Organizations should inventory and monitor the use of JBL LIVE PRO 2 TWS earbuds within their environment and restrict their use in sensitive areas until patched. 3. Implement Bluetooth device management policies that limit pairing and connections to trusted devices only, using device whitelisting where possible. 4. Employ physical security controls to reduce the risk of adjacent attackers gaining proximity, such as restricting unauthorized personnel access to sensitive workspaces. 5. Monitor Bluetooth traffic for anomalous connection attempts or unusual command patterns targeting audio devices. 6. Educate users about the risks of using vulnerable Bluetooth peripherals and encourage reporting of suspicious device behavior. 7. Consider alternative audio devices with stronger security postures in high-risk environments until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2024-03-01T16:45:42.526Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69397292471be09b6e332ffb

Added to database: 12/10/2025, 1:16:02 PM

Last enriched: 12/10/2025, 1:30:58 PM

Last updated: 12/11/2025, 7:31:06 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats