Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63895: n/a

0
Unknown
VulnerabilityCVE-2025-63895cvecve-2025-63895
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the Bluetooth firmware of JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted Link Manager Protocol (LMP) packet.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:57:51 UTC

Technical Analysis

CVE-2025-63895 identifies a vulnerability in the Bluetooth firmware of the JXL 9 Inch Car Android Double Din Player, which operates on Android version 12.0. The flaw lies in the handling of Link Manager Protocol (LMP) packets, a fundamental component of Bluetooth communication responsible for link setup and management. An attacker can exploit this vulnerability by sending a crafted LMP packet to the device, causing a Denial of Service (DoS) condition. This DoS likely results in the Bluetooth firmware crashing or becoming unresponsive, thereby disrupting Bluetooth connectivity. Since the vulnerability is in the firmware layer, it affects the device's ability to maintain stable Bluetooth connections, which are critical for hands-free calling, media streaming, and other in-car functionalities. The exploit does not require prior authentication or user interaction, increasing the risk of remote exploitation, especially in environments where Bluetooth is exposed or discoverable. No CVSS score has been assigned yet, and no patches or known exploits are currently documented. The vulnerability was reserved in late October 2025 and published in December 2025, indicating recent discovery. The lack of patch links suggests that the vendor has not yet released a fix, emphasizing the need for vigilance and interim protective measures.

Potential Impact

The primary impact of CVE-2025-63895 is on the availability of Bluetooth services in affected car infotainment systems. For European organizations, especially those operating fleets or corporate vehicles equipped with the JXL 9 Inch Car Android Double Din Player, this could lead to operational disruptions such as loss of hands-free communication, navigation assistance, and media streaming capabilities. This may reduce driver safety and productivity, particularly in logistics, transportation, and field service sectors. Additionally, a persistent DoS condition could necessitate device resets or replacements, incurring maintenance costs. While confidentiality and integrity impacts are not evident, the disruption of Bluetooth connectivity can indirectly affect business continuity and user experience. The absence of known exploits reduces immediate risk, but the ease of exploitation and lack of authentication requirements mean attackers could target vehicles in public or semi-public spaces. The threat is more pronounced in environments where Bluetooth is actively used and exposed, such as corporate parking areas or service depots.

Mitigation Recommendations

1. Monitor the vendor’s official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 2. Disable Bluetooth discoverability on the affected devices when not in use to reduce exposure to unsolicited LMP packets. 3. Implement network segmentation and physical security controls to limit unauthorized access to vehicle infotainment systems. 4. For fleet operators, consider deploying endpoint detection solutions capable of monitoring Bluetooth traffic anomalies indicative of crafted LMP packet attacks. 5. Educate drivers and users about minimizing Bluetooth usage in high-risk areas and reporting unusual device behavior. 6. If feasible, temporarily disable Bluetooth functionality in vehicles where it is not critical until a patch is released. 7. Collaborate with automotive cybersecurity experts to assess the risk and develop incident response plans tailored to connected vehicle environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939cd32c9771d4f433dddb5

Added to database: 12/10/2025, 7:42:42 PM

Last enriched: 12/10/2025, 7:57:51 PM

Last updated: 12/11/2025, 7:25:16 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats