Description
An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to force the infotainment system into accepting falsified GPS signals as legitimate, resulting in the device reporting an incorrect or static location.
Published: 2026-04-07
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Location spoofing via falsified GPS signals
Action: Apply Update
AI Analysis

Impact

An issue in the JXL 9 Inch Car Android Double Din Player Android v12.0 permits an attacker to force the infotainment system into accepting forged GPS signals as legitimate. When triggered, the device reports an incorrect or static location, thereby undermining the integrity of navigation data, potentially enabling geofence evasion, routing manipulation, or other location‑based exploits. The weakness maps to CWE‑941, reflecting improper authentication or authorization of external signal sources.

Affected Systems

The vulnerability affects the JXL 9 Inch Car Android Double Din Player running Android v12.0. No additional vendor or product versions are listed, so the scope is limited to this specific infotainment unit.

Risk and Exploitability

The CVSS score of 9.1 indicates a high severity impact, while the EPSS score of less than 1% points to a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector requires the attacker to supply falsified GPS data to the device, which could be achieved through a compromised OBD interface, a physical access to the device, or exploitation of a network channel feeding GPS data. These conditions imply that the attacker needs proximity or compromised input channels, but once achieved, the impact is substantial.

Generated by OpenCVE AI on April 10, 2026 at 11:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the availability of a newer firmware version for the JXL infotainment unit and install it immediately.
  • If no update is available, limit the GPS input to trusted hardware modules or disable external GPS data processing to prevent spoofed signals from being accepted.
  • Segregate the infotainment network to block unauthorized data sources from reaching the GPS interface.
  • Enable logging of location reports and periodically reconcile them against known vehicle routes to detect anomalies early.

Generated by OpenCVE AI on April 10, 2026 at 11:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title GPS Spoofing in JXL 9‑Inch Car Android Infotainment

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title GPS Spoofing Vulnerability in JXL 9‑Inch Car Android Double‑Din Player
Weaknesses CWE-295

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-941
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Jxlindia
Jxlindia jxl 9 Inch Car Android Double Din Player
Vendors & Products Jxlindia
Jxlindia jxl 9 Inch Car Android Double Din Player

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title GPS Spoofing Vulnerability in JXL 9‑Inch Car Android Double‑Din Player
Weaknesses CWE-295

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to force the infotainment system into accepting falsified GPS signals as legitimate, resulting in the device reporting an incorrect or static location.
References

Subscriptions

Jxlindia Jxl 9 Inch Car Android Double Din Player
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-09T14:19:30.744Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69515

cve-icon Vulnrichment

Updated: 2026-04-09T14:17:35.690Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T20:16:22.950

Modified: 2026-04-09T15:16:08.863

Link: CVE-2025-69515

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:28Z

Weaknesses