CVE-2025-63896
📋 TL;DR
This vulnerability allows attackers to inject arbitrary keystrokes into JXL 9 Inch Car Android Double Din Player devices by spoofing a Bluetooth HID device. Attackers can simulate keyboard input to potentially control the infotainment system. This affects users of the specific JXL car Android device running Android v12.0.
💻 Affected Systems
- JXL 9 Inch Car Android Double Din Player
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker could take full control of the infotainment system, access navigation data, make unauthorized calls, manipulate media, or potentially access connected smartphone data via the compromised device.
Likely Case
Attackers could inject keystrokes to open malicious apps, change settings, or access personal information stored on the device.
If Mitigated
With Bluetooth disabled or proper pairing controls, the attack surface is significantly reduced to physical proximity attacks only.
🎯 Exploit Status
Exploitation requires Bluetooth proximity and spoofing a HID device, which can be done with readily available tools like Bluetooth adapters and software.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://jxl.com
Restart Required: No
Instructions:
No official patch available. Monitor vendor website for firmware updates.
🔧 Temporary Workarounds
Disable Bluetooth when not in use
allTurn off Bluetooth functionality to prevent HID device pairing attempts
Navigate to Settings > Bluetooth > Toggle Bluetooth OFF
Enable Bluetooth pairing restrictions
allSet Bluetooth to non-discoverable mode and require manual confirmation for pairing
Navigate to Settings > Bluetooth > Visibility > Set to 'Hidden' or 'Non-discoverable'
🧯 If You Can't Patch
- Physically secure the vehicle when parked to prevent proximity attacks
- Regularly monitor for suspicious Bluetooth pairing attempts or unexpected device behavior
🔍 How to Verify
Check if Vulnerable:
Check device model and Android version in Settings > About Device. If it matches affected products/versions and Bluetooth is enabled, the device is vulnerable.
Check Version:
Navigate to Settings > About Device > Android Version
Verify Fix Applied:
No official fix available to verify. Workarounds can be verified by confirming Bluetooth is disabled or in non-discoverable mode.
📡 Detection & Monitoring
Log Indicators:
- Unexpected Bluetooth pairing events
- Unfamiliar Bluetooth device names in pairing history
- Unexpected keystroke inputs in system logs
Network Indicators:
- Bluetooth connection attempts from unknown MAC addresses
- HID profile connections from unauthorized devices
SIEM Query:
Not applicable - this is a Bluetooth-based attack not typically monitored by network SIEM systems.