Skip to main content

CVE-2025-5478: CWE-190: Integer Overflow or Wraparound in Sony XAV-AX8500

High
VulnerabilityCVE-2025-5478cvecve-2025-5478cwe-190
Published: Sat Jun 21 2025 (06/21/2025, 00:09:58 UTC)
Source: CVE Database V5
Vendor/Project: Sony
Product: XAV-AX8500

Description

Sony XAV-AX8500 Bluetooth SDP Protocol Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Bluetooth SDP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26288.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:36:46 UTC

Technical Analysis

CVE-2025-5478 is a high-severity vulnerability identified in the Sony XAV-AX8500 multimedia receiver, specifically affecting version 2.00.01. The flaw resides in the implementation of the Bluetooth Service Discovery Protocol (SDP) within the device. Due to improper validation of user-supplied data, an integer overflow or wraparound condition can occur when processing SDP requests. This integer overflow leads to incorrect buffer size allocation, which an attacker can exploit to perform a remote code execution (RCE) attack. Notably, the vulnerability can be exploited by a network-adjacent attacker without requiring any authentication or user interaction, increasing the risk profile. Successful exploitation allows the attacker to execute arbitrary code with root privileges, potentially gaining full control over the affected device. The vulnerability is tracked under CWE-190 (Integer Overflow or Wraparound) and has been assigned a CVSS v3.0 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the technical details and ease of exploitation make this a critical issue for users of the Sony XAV-AX8500. The lack of an available patch at the time of publication further elevates the urgency for mitigation.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential compromise of Sony XAV-AX8500 devices deployed within corporate fleets, especially in vehicles or mobile environments where these multimedia receivers are used. Exploitation could lead to full device takeover, enabling attackers to execute arbitrary code with root privileges. This could result in unauthorized access to sensitive data, disruption of device functionality, or pivoting into connected networks. Given that these devices often interface with vehicle systems and potentially with enterprise mobile device management solutions, the risk extends to broader operational disruption and data breaches. The Bluetooth SDP protocol exposure means that attackers only need to be within wireless range, which could be exploited in parking lots, garages, or other physical proximity scenarios. For organizations relying on these devices for in-vehicle infotainment or telematics, the vulnerability could undermine both operational continuity and data security. Additionally, the lack of authentication and user interaction requirements increases the likelihood of automated or opportunistic attacks, raising concerns for industries with mobile workforces or logistics operations across Europe.

Mitigation Recommendations

1. Immediate mitigation should focus on disabling Bluetooth SDP services on Sony XAV-AX8500 devices where feasible, especially in environments where Bluetooth connectivity is not essential. 2. Network segmentation should be enforced to isolate devices with Bluetooth capabilities from critical enterprise networks to limit lateral movement in case of compromise. 3. Employ Bluetooth monitoring tools capable of detecting anomalous SDP requests or unusual Bluetooth activity to identify potential exploitation attempts. 4. Coordinate with Sony for timely firmware updates or patches; monitor official channels for release announcements and apply updates promptly once available. 5. For organizations managing fleets, implement strict physical security controls to limit unauthorized proximity access to vehicles equipped with vulnerable devices. 6. Conduct regular security audits of in-vehicle systems and integrate vulnerability scanning for connected multimedia devices. 7. Educate relevant personnel about the risks associated with Bluetooth vulnerabilities and encourage reporting of suspicious device behavior. These measures go beyond generic advice by focusing on the specific attack vector (Bluetooth SDP) and the operational context of the affected product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-02T19:14:49.719Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68568e80aded773421b5a77b

Added to database: 6/21/2025, 10:50:40 AM

Last enriched: 6/21/2025, 11:36:46 AM

Last updated: 8/18/2025, 11:31:57 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats