An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices.
Metrics
Affected Vendors & Products
References
History
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jbl
Jbl boombox 2 Jbl boombox 3 Jbl flip 5 Jbl flip 6 Jbl pulse 4 Jbl pulse 5 Jbl xtreme 3 |
|
| Vendors & Products |
Jbl
Jbl boombox 2 Jbl boombox 3 Jbl flip 5 Jbl flip 6 Jbl pulse 4 Jbl pulse 5 Jbl xtreme 3 |
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices. | |
| Title | JBL: Improper validation of ICM field in connection requests | |
| Weaknesses | CWE-1287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-12-10T13:01:54.421Z
Updated: 2025-12-10T15:49:54.790Z
Reserved: 2024-03-01T16:45:43.784Z
Link: CVE-2024-2105
Updated: 2025-12-10T15:49:50.987Z
Status : Awaiting Analysis
Published: 2025-12-10T13:16:02.793
Modified: 2025-12-12T15:18:42.140
Link: CVE-2024-2105
No data.