CVSS VectorNVD
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4DescriptionNVD
Sony XAV-AX8500 Bluetooth Improper Isolation Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of ACL-U links. The issue results from the lack of L2CAP channel isolation. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26284.
AnalysisAI
CVE-2025-5476 is an authentication bypass vulnerability in Sony XAV-AX8500 Bluetooth car audio systems caused by improper L2CAP channel isolation in ACL-U links. A network-adjacent attacker can completely bypass authentication without user interaction to gain full control (read, modify, execute) of the device. This is a critical vulnerability affecting in-vehicle infotainment systems with potential safety and privacy implications.
Technical ContextAI
The vulnerability exists in the Bluetooth implementation of the Sony XAV-AX8500, specifically in the handling of ACL-U (Asynchronous Connection-Less Unauthenticated) links at the L2CAP (Logical Link Control and Adaptation Protocol) layer. The root cause is CWE-653 (Improper Isolation or Compartmentalization), where L2CAP channels are not properly isolated, allowing an attacker on an adjacent Bluetooth network to establish unauthorized channels and bypass the device's authentication mechanisms. This is fundamentally a protocol implementation flaw where the device fails to enforce proper state management and channel segregation in its Bluetooth stack, particularly in the early stages of connection establishment before authentication occurs.
RemediationAI
Immediate remediation requires: (1) Contact Sony directly or monitor their security advisory page for XAV-AX8500 firmware patches that address L2CAP channel isolation; (2) Apply firmware update to the device when available (typically done via USB or wireless update mechanism); (3) Until patches are available, mitigate by disabling Bluetooth on the device when parked in public areas, or reducing Bluetooth transmission power if supported; (4) Keep the device physically secure and avoid parking in high-risk areas; (5) Monitor for unauthorized pairing attempts in the device's Bluetooth settings; (6) If vehicle connectivity is critical, consider disabling sensitive functions (navigation history, stored credentials) from syncing to the infotainment system. Vendor patch status should be confirmed at Sony's official support page for the XAV-AX8500.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18881