JXL Android Double Din Player Denial of Service

HIGH (7.5)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.04% chance of exploitation (percentile: 12%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

The JXL 9 Inch Car Android Double Din Player is a Bluetooth-enabled media player used in some vehicles. This vulnerability allows attackers to cause a Denial of Service (DoS) by sending a crafted Link Manager Protocol (LMP) packet, potentially disrupting the vehicle's Bluetooth connectivity and audio functionality.

Am I affected?

You're affected if you use An. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

Upgrade to JXL Android Double Din Player version 12.0 or later.
- Alternatively, apply immediate mitigations:
- Disable Bluetooth on the vehicle's infotainment system (firewall it from public internet)
- Monitor for suspicious Bluetooth activity

References