CVE-2025-8652
📋 TL;DR
This vulnerability allows physically present attackers to execute arbitrary code with root privileges on Kenwood DMX958XR car multimedia systems without authentication. Attackers can exploit command injection in the JKWifiService to gain complete control of affected devices. Only physically accessible devices are vulnerable.
💻 Affected Systems
- Kenwood DMX958XR
📦 What is this software?
Dmx958xr Firmware by Jvckenwood
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full root access to the device, potentially compromising vehicle systems, stealing data, or using the device as an entry point to connected networks.
Likely Case
Local attacker executes arbitrary commands to modify device settings, install malware, or access stored data like Bluetooth pairings and WiFi credentials.
If Mitigated
With physical security controls preventing unauthorized access, impact is limited to authorized users who would need to deliberately exploit the vulnerability.
🎯 Exploit Status
Exploitation requires physical access and knowledge of the vulnerability, but no authentication is needed once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Kenwood firmware updates
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-800/
Restart Required: Yes
Instructions:
1. Check Kenwood support website for firmware updates. 2. Download latest firmware for DMX958XR. 3. Install update via USB following manufacturer instructions. 4. Verify installation and restart device.
🔧 Temporary Workarounds
Disable WiFi Service
androidTemporarily disable the vulnerable JKWifiService if not needed
adb shell pm disable com.kenwood.jkwifiservice
Physical Security Controls
allImplement physical security measures to prevent unauthorized access to vehicle
🧯 If You Can't Patch
- Park vehicles in secure, monitored locations to prevent physical access by unauthorized individuals.
- Disconnect device from vehicle power when not in use for extended periods to prevent exploitation.
🔍 How to Verify
Check if Vulnerable:
Check firmware version in device settings; if not updated to latest version, assume vulnerable.
Check Version:
adb shell getprop ro.build.version.incremental
Verify Fix Applied:
Verify firmware version matches latest release from Kenwood and test WiFi service functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- WiFi service crashes or abnormal restarts
- Unexpected process execution from JKWifiService
Network Indicators:
- Unusual network traffic from device when vehicle is parked
- Unexpected outbound connections from head unit
SIEM Query:
source="vehicle_systems" AND (process="JKWifiService" AND command_execution=*)