CVE-2021-36201: CWE-204: Observable Response Discrepancy in Johnson Controls C•CURE 9000
Under certain circumstances a CCURE Portal user could enumerate user accounts in CCURE 9000 version 2.90 and prior versions.
AI Analysis
Technical Summary
CVE-2021-36201 is a vulnerability identified in Johnson Controls' C•CURE 9000 security and event management system, specifically affecting version 2.90 and earlier. The vulnerability is categorized under CWE-204, which relates to Observable Response Discrepancy, allowing an attacker to enumerate user accounts via the CCURE Portal. Enumeration occurs when an attacker can distinguish valid user accounts from invalid ones based on differences in system responses, even without authentication or user interaction. This flaw arises because the system's responses to account queries differ in a way that reveals the existence or absence of specific user accounts. The vulnerability has a CVSS v3.1 base score of 4.3, indicating a medium severity level. The vector metrics are AV:A (Attack Vector: Adjacent Network), AC:L (Low Attack Complexity), PR:N (No Privileges Required), UI:N (No User Interaction), and S:U (Scope Unchanged). This means the vulnerability can be exploited remotely from an adjacent network segment without authentication or user interaction, but it does not affect resources beyond the vulnerable component. While the vulnerability does not directly compromise confidentiality, integrity, or availability of the system, it leaks information about user accounts, which could be leveraged in subsequent attacks such as targeted phishing, brute force, or privilege escalation attempts. No known exploits are currently reported in the wild, and no official patches are linked in the provided information, suggesting that mitigation may require vendor engagement or configuration changes. Johnson Controls C•CURE 9000 is widely used in physical security management, including access control in critical infrastructure, commercial buildings, and government facilities, making this vulnerability relevant for organizations relying on this product for secure facility management.
Potential Impact
For European organizations, the impact of CVE-2021-36201 primarily lies in the potential exposure of user account information within the C•CURE 9000 system. This information disclosure can facilitate reconnaissance by threat actors, enabling them to identify valid user accounts for further targeted attacks such as credential stuffing, phishing, or social engineering. Given that C•CURE 9000 is often deployed in environments requiring stringent physical security—such as airports, government buildings, healthcare facilities, and critical infrastructure—this vulnerability could indirectly compromise physical security by aiding attackers in bypassing access controls. Although the vulnerability itself does not allow direct system compromise, the leakage of user enumeration data increases the attack surface and risk profile for affected organizations. European entities subject to strict data protection regulations like GDPR must also consider the implications of unauthorized exposure of user information, which could lead to compliance issues and reputational damage. The medium severity rating reflects the limited direct impact but acknowledges the potential for this vulnerability to be a stepping stone in a multi-stage attack chain.
Mitigation Recommendations
To mitigate CVE-2021-36201, European organizations using C•CURE 9000 version 2.90 or earlier should first verify if Johnson Controls has released any patches or updates addressing this vulnerability and apply them promptly. In the absence of official patches, organizations should implement network segmentation to restrict access to the CCURE Portal to trusted and authenticated users only, minimizing exposure to adjacent network attackers. Employing strict access control lists (ACLs) and firewall rules to limit portal access to necessary personnel and systems reduces the attack surface. Additionally, monitoring and logging access attempts to the CCURE Portal can help detect unusual enumeration activity. Organizations should also conduct regular user account audits to identify and remove inactive or unnecessary accounts, reducing the value of enumeration data. Where possible, implementing multi-factor authentication (MFA) for portal access can further protect against unauthorized use of enumerated accounts. Finally, raising awareness among security and physical access teams about this vulnerability can help in recognizing and responding to suspicious activities that may exploit user enumeration.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2021-36201: CWE-204: Observable Response Discrepancy in Johnson Controls C•CURE 9000
Description
Under certain circumstances a CCURE Portal user could enumerate user accounts in CCURE 9000 version 2.90 and prior versions.
AI-Powered Analysis
Technical Analysis
CVE-2021-36201 is a vulnerability identified in Johnson Controls' C•CURE 9000 security and event management system, specifically affecting version 2.90 and earlier. The vulnerability is categorized under CWE-204, which relates to Observable Response Discrepancy, allowing an attacker to enumerate user accounts via the CCURE Portal. Enumeration occurs when an attacker can distinguish valid user accounts from invalid ones based on differences in system responses, even without authentication or user interaction. This flaw arises because the system's responses to account queries differ in a way that reveals the existence or absence of specific user accounts. The vulnerability has a CVSS v3.1 base score of 4.3, indicating a medium severity level. The vector metrics are AV:A (Attack Vector: Adjacent Network), AC:L (Low Attack Complexity), PR:N (No Privileges Required), UI:N (No User Interaction), and S:U (Scope Unchanged). This means the vulnerability can be exploited remotely from an adjacent network segment without authentication or user interaction, but it does not affect resources beyond the vulnerable component. While the vulnerability does not directly compromise confidentiality, integrity, or availability of the system, it leaks information about user accounts, which could be leveraged in subsequent attacks such as targeted phishing, brute force, or privilege escalation attempts. No known exploits are currently reported in the wild, and no official patches are linked in the provided information, suggesting that mitigation may require vendor engagement or configuration changes. Johnson Controls C•CURE 9000 is widely used in physical security management, including access control in critical infrastructure, commercial buildings, and government facilities, making this vulnerability relevant for organizations relying on this product for secure facility management.
Potential Impact
For European organizations, the impact of CVE-2021-36201 primarily lies in the potential exposure of user account information within the C•CURE 9000 system. This information disclosure can facilitate reconnaissance by threat actors, enabling them to identify valid user accounts for further targeted attacks such as credential stuffing, phishing, or social engineering. Given that C•CURE 9000 is often deployed in environments requiring stringent physical security—such as airports, government buildings, healthcare facilities, and critical infrastructure—this vulnerability could indirectly compromise physical security by aiding attackers in bypassing access controls. Although the vulnerability itself does not allow direct system compromise, the leakage of user enumeration data increases the attack surface and risk profile for affected organizations. European entities subject to strict data protection regulations like GDPR must also consider the implications of unauthorized exposure of user information, which could lead to compliance issues and reputational damage. The medium severity rating reflects the limited direct impact but acknowledges the potential for this vulnerability to be a stepping stone in a multi-stage attack chain.
Mitigation Recommendations
To mitigate CVE-2021-36201, European organizations using C•CURE 9000 version 2.90 or earlier should first verify if Johnson Controls has released any patches or updates addressing this vulnerability and apply them promptly. In the absence of official patches, organizations should implement network segmentation to restrict access to the CCURE Portal to trusted and authenticated users only, minimizing exposure to adjacent network attackers. Employing strict access control lists (ACLs) and firewall rules to limit portal access to necessary personnel and systems reduces the attack surface. Additionally, monitoring and logging access attempts to the CCURE Portal can help detect unusual enumeration activity. Organizations should also conduct regular user account audits to identify and remove inactive or unnecessary accounts, reducing the value of enumeration data. Where possible, implementing multi-factor authentication (MFA) for portal access can further protect against unauthorized use of enumerated accounts. Finally, raising awareness among security and physical access teams about this vulnerability can help in recognizing and responding to suspicious activities that may exploit user enumeration.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jci
- Date Reserved
- 2021-07-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec443
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:24:31 PM
Last updated: 8/12/2025, 10:31:05 AM
Views: 21
Related Threats
CVE-2025-8046: CWE-79 Cross-Site Scripting (XSS) in Injection Guard
UnknownCVE-2025-7808: CWE-79 Cross-Site Scripting (XSS) in WP Shopify
UnknownCVE-2025-6790: CWE-352 Cross-Site Request Forgery (CSRF) in Quiz and Survey Master (QSM)
UnknownCVE-2025-3414: CWE-79 Cross-Site Scripting (XSS) in Structured Content (JSON-LD) #wpsc
UnknownCVE-2025-8938: Backdoor in TOTOLINK N350R
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.