An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Jbl
Jbl boombox 2
Jbl boombox 3
Jbl flip 5
Jbl flip 6
Jbl pulse 4
Jbl pulse 5
Jbl xtreme 3
Vendors & Products Jbl
Jbl boombox 2
Jbl boombox 3
Jbl flip 5
Jbl flip 6
Jbl pulse 4
Jbl pulse 5
Jbl xtreme 3

Wed, 10 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices.
Title JBL: Improper validation of ICM field in connection requests
Weaknesses CWE-1287
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-12-10T15:49:54.790Z

Reserved: 2024-03-01T16:45:43.784Z

Link: CVE-2024-2105

cve-icon Vulnrichment

Updated: 2025-12-10T15:49:50.987Z

cve-icon NVD

Status : Received

Published: 2025-12-10T13:16:02.793

Modified: 2025-12-10T13:16:02.793

Link: CVE-2024-2105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-10T21:33:03Z

Weaknesses