Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63895: n/a

0
High
VulnerabilityCVE-2025-63895cvecve-2025-63895
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the Bluetooth firmware of JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted Link Manager Protocol (LMP) packet.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:39:00 UTC

Technical Analysis

The vulnerability identified as CVE-2025-63895 affects the Bluetooth firmware of the JXL 9 Inch Car Android Double Din Player running Android version 12.0. The flaw resides in the handling of Link Manager Protocol (LMP) packets, a fundamental part of Bluetooth communication responsible for link setup and control. An attacker can send a crafted LMP packet to the device, triggering a Denial of Service (DoS) condition that disrupts the normal operation of the Bluetooth subsystem. This results in loss of availability of Bluetooth services, potentially impacting connected devices and features reliant on Bluetooth connectivity. The vulnerability does not require any privileges or user interaction, making it remotely exploitable by any attacker within Bluetooth range. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no impact on confidentiality or integrity, and the low attack complexity. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The underlying weakness corresponds to CWE-404, which relates to improper resource shutdown or release, indicating that the firmware fails to handle malformed LMP packets gracefully, leading to a crash or hang state. This vulnerability is particularly relevant for automotive environments where Bluetooth connectivity is used for hands-free calling, media streaming, or device pairing, potentially disrupting driver experience or safety features dependent on Bluetooth.

Potential Impact

For European organizations, especially those in automotive manufacturing, fleet management, and transportation services, this vulnerability poses a risk of service disruption. Vehicles equipped with the affected JXL 9 Inch Car Android Double Din Player may experience Bluetooth outages, impacting hands-free communication, navigation aids, and media streaming. This could degrade driver safety and user experience. Additionally, organizations using these devices in commercial fleets could face operational inefficiencies or increased support costs. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability in critical in-vehicle systems could have safety implications. The lack of patches increases exposure duration. Attackers within Bluetooth range, such as in parking lots or service centers, could exploit this to cause targeted disruptions. The impact is more pronounced in sectors relying heavily on connected car technologies and where alternative communication means are limited.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement compensating controls. First, disable Bluetooth functionality on affected devices when not in use to eliminate the attack surface. Where disabling is not feasible, restrict physical access to vehicles or devices to trusted personnel to reduce the risk of proximity attacks. Employ Bluetooth monitoring tools to detect anomalous LMP packet activity or repeated connection attempts that may indicate exploitation attempts. Update device inventories to identify all units running the vulnerable firmware and prioritize their replacement or isolation. Engage with the vendor for firmware updates or advisories and apply patches promptly once released. Consider deploying network segmentation for connected vehicle management systems to limit lateral movement in case of exploitation. Train staff on recognizing signs of Bluetooth service disruption and reporting incidents promptly. For fleet operators, establish incident response plans that include fallback communication methods if Bluetooth services fail.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939cd32c9771d4f433dddb5

Added to database: 12/10/2025, 7:42:42 PM

Last enriched: 12/17/2025, 8:39:00 PM

Last updated: 2/7/2026, 4:21:06 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats