CVE-2025-69515
Received Received - Intake
GPS Spoofing Vulnerability in JXL 9 Inch Android Player

Publication date: 2026-04-07

Last updated on: 2026-04-09

Assigner: MITRE

Description
An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to force the infotainment system into accepting falsified GPS signals as legitimate, resulting in the device reporting an incorrect or static location.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jxl 9_inch_car_android_double_din_player 12.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-941 The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-69515 affects the JXL 9 Inch Car Android Double Din Player running Android 12.0. The vulnerability exists in the GNSS Receiver Module and related location services because the system does not validate the integrity of incoming GPS signals.

An attacker can broadcast spoofed GPS signals using a Software Defined Radio (SDR) device from nearby RF proximity. The infotainment system may accept these falsified signals as legitimate, causing it to report incorrect or static location data.

This attack requires no authentication or user interaction and can be performed remotely without physical access to the device.


How can this vulnerability impact me? :

The vulnerability allows an attacker to manipulate the vehicle's reported location by spoofing GPS signals, which can lead to incorrect navigation information.

This impacts the integrity and availability of the infotainment system's location data, potentially causing navigation errors or misleading location reporting.

However, the attack does not affect data confidentiality and is limited to the infotainment system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the JXL 9 Inch Car Android Double Din Player accepting falsified GPS signals due to lack of integrity validation in the GNSS input path. Detection involves monitoring the infotainment system's GPS data for inconsistencies or static location reports that do not correspond to actual movement.

Since the attack requires an attacker to be in RF proximity using a Software Defined Radio (SDR) to broadcast spoofed GPS signals, detection can include checking for unusual GPS signal strength or sudden location jumps.

Specific commands are not provided in the available resources, but general approaches could include:

  • Using Android debugging tools (adb) to monitor GPS location data logs for anomalies.
  • Running commands to check GPS chipset status or logs, such as `adb shell dumpsys location` to review location service status.
  • Monitoring for static or inconsistent GPS coordinates over time.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the JXL 9 Inch Car Android Double Din Player allows attackers to spoof GPS signals, causing the device to report incorrect or static locations. This impacts the integrity and availability of location data within the infotainment system.

However, the attack does not affect data confidentiality and is limited to the infotainment system's navigation and location reporting functions.

There is no direct information provided about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps focus on reducing the risk of GPS spoofing attacks on the JXL 9 Inch Car Android Double Din Player infotainment system.

  • Physically secure the vehicle and infotainment system to prevent attackers from gaining RF proximity needed to broadcast spoofed GPS signals.
  • Avoid parking or operating the vehicle in areas where attackers could easily use SDR devices nearby.
  • Monitor GPS data for unusual behavior and report inconsistencies to the device manufacturer for firmware updates or patches.
  • Request or apply any available software or firmware updates from the vendor that address GPS signal validation.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart