CVE-2023-4486: CWE-400 Uncontrolled Resource Consumption in Johnson Controls Metasys NAE55/SNE/SNC
Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to versions 11.0.6 and 12.0.4 and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.
AI Analysis
Technical Summary
CVE-2023-4486 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Johnson Controls Metasys NAE55, SNE, and SNC engines, as well as Facility Explorer F4-SNC engines. The issue arises when invalid authentication credentials are sent to the login endpoint of affected versions prior to 11.0.6 and 12.0.4. Under these circumstances, the system can be forced into a denial-of-service (DoS) state due to resource exhaustion. This vulnerability does not require any authentication or user interaction to exploit, and the attack vector is network-based (AV:N), making it remotely exploitable over the network. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. The affected products are building automation and control systems widely used for managing HVAC, lighting, and other critical infrastructure in commercial and industrial environments. The vulnerability’s CVSS v3.1 base score is 7.5, reflecting its high severity due to ease of exploitation and significant impact on system availability. No known exploits in the wild have been reported as of the publication date. Johnson Controls has released fixed versions 11.0.6 and 12.0.4 to address this issue, but no direct patch links were provided in the source information.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of building management systems that are critical for operational continuity, energy management, and safety. Disruption of Metasys engines could lead to loss of control over HVAC, lighting, and other facility systems, potentially causing operational downtime, increased energy costs, and safety hazards. Critical infrastructure facilities, hospitals, data centers, and large commercial buildings relying on these systems could face operational interruptions. Given the remote exploitability and no requirement for authentication, attackers could launch DoS attacks from outside the network, potentially causing widespread service outages. This could also have cascading effects on business continuity and regulatory compliance, especially in sectors with strict uptime and safety requirements. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading affected Johnson Controls Metasys and Facility Explorer engines to versions 11.0.6 or 12.0.4 as soon as possible. Until patches are applied, network-level mitigations should be implemented, including restricting access to the login endpoints via firewall rules or network segmentation to trusted management networks only. Monitoring and alerting for unusual authentication attempts or spikes in login failures can help detect exploitation attempts early. Organizations should also conduct thorough asset inventories to identify all affected devices and ensure they are included in patch management processes. Additionally, implementing rate limiting or intrusion prevention systems (IPS) that can detect and block excessive invalid login attempts may reduce the risk of resource exhaustion. Regular backups and incident response plans should be updated to address potential DoS scenarios affecting building management systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2023-4486: CWE-400 Uncontrolled Resource Consumption in Johnson Controls Metasys NAE55/SNE/SNC
Description
Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to versions 11.0.6 and 12.0.4 and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.
AI-Powered Analysis
Technical Analysis
CVE-2023-4486 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Johnson Controls Metasys NAE55, SNE, and SNC engines, as well as Facility Explorer F4-SNC engines. The issue arises when invalid authentication credentials are sent to the login endpoint of affected versions prior to 11.0.6 and 12.0.4. Under these circumstances, the system can be forced into a denial-of-service (DoS) state due to resource exhaustion. This vulnerability does not require any authentication or user interaction to exploit, and the attack vector is network-based (AV:N), making it remotely exploitable over the network. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. The affected products are building automation and control systems widely used for managing HVAC, lighting, and other critical infrastructure in commercial and industrial environments. The vulnerability’s CVSS v3.1 base score is 7.5, reflecting its high severity due to ease of exploitation and significant impact on system availability. No known exploits in the wild have been reported as of the publication date. Johnson Controls has released fixed versions 11.0.6 and 12.0.4 to address this issue, but no direct patch links were provided in the source information.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of building management systems that are critical for operational continuity, energy management, and safety. Disruption of Metasys engines could lead to loss of control over HVAC, lighting, and other facility systems, potentially causing operational downtime, increased energy costs, and safety hazards. Critical infrastructure facilities, hospitals, data centers, and large commercial buildings relying on these systems could face operational interruptions. Given the remote exploitability and no requirement for authentication, attackers could launch DoS attacks from outside the network, potentially causing widespread service outages. This could also have cascading effects on business continuity and regulatory compliance, especially in sectors with strict uptime and safety requirements. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading affected Johnson Controls Metasys and Facility Explorer engines to versions 11.0.6 or 12.0.4 as soon as possible. Until patches are applied, network-level mitigations should be implemented, including restricting access to the login endpoints via firewall rules or network segmentation to trusted management networks only. Monitoring and alerting for unusual authentication attempts or spikes in login failures can help detect exploitation attempts early. Organizations should also conduct thorough asset inventories to identify all affected devices and ensure they are included in patch management processes. Additionally, implementing rate limiting or intrusion prevention systems (IPS) that can detect and block excessive invalid login attempts may reduce the risk of resource exhaustion. Regular backups and incident response plans should be updated to address potential DoS scenarios affecting building management systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jci
- Date Reserved
- 2023-08-22T19:40:01.192Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68371692182aa0cae24f0c48
Added to database: 5/28/2025, 1:58:42 PM
Last enriched: 7/7/2025, 9:24:33 AM
Last updated: 8/17/2025, 3:00:50 AM
Views: 16
Related Threats
CVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
HighCVE-2025-36120: CWE-863 Incorrect Authorization in IBM Storage Virtualize
HighCVE-2025-43732: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
MediumCVE-2025-9103: Cross Site Scripting in ZenCart
MediumCVE-2025-41242: Vulnerability in VMware Spring Framework
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.