8.8 CVE-2025-5820

Patch
 

Sony XAV-AX8500 Bluetooth ERTM Channel Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of Bluetooth ERTM channel communication. The issue results from improper channel data initialization. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26285.
https://nvd.nist.gov/vuln/detail/CVE-2025-5820

Categories

CWE-288 : Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication. Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource. Router allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters. Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key. OS allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock. Direct request of installation file allows attacker to create administrator accounts. Attackers may gain additional privileges by directly requesting the web management URL. Bypass authentication via direct request to named pipe. User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing.

References


 

CPE

cpe start end
Configuration 1
AND
   cpe:2.3:o:sony:xav-ax8500_firmware:*:*:*:*:*:*:*:* >= 2.00.1 < 3.02.00
  Running on/with
  cpe:2.3:h:sony:xav-ax8500:-:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://www.sony.com/electronics/support/mobile-cd-players-digital-media-play...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
127 Directory Indexing
Medium
665 Exploitation of Thunderbolt Protection Flaws
Very High


MITRE


Techniques

id description
T1083 File and Directory Discovery
T1211 Exploitation for Defensive Evasion
T1542.002 Pre-OS Boot:Component Firmware
T1556 Modify Authentication Process
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1051 Update software regularly by employing patch management for internal enterprise endpoints and servers.
M1051 Perform regular firmware updates to mitigate risks of exploitation and/or abuse.
M1018 Ensure that proper policies are implemented to dictate the the secure enrollment and deactivation of authentication mechanisms, such as MFA, for user accounts.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.