Skip to main content

CVE-2023-4486: CWE-400 Uncontrolled Resource Consumption in Johnson Controls Metasys NAE55/SNE/SNC

High
VulnerabilityCVE-2023-4486cvecve-2023-4486cwe-400
Published: Thu Dec 07 2023 (12/07/2023, 19:55:39 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Metasys NAE55/SNE/SNC

Description

Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to versions 11.0.6 and 12.0.4 and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.

AI-Powered Analysis

AILast updated: 07/07/2025, 09:24:33 UTC

Technical Analysis

CVE-2023-4486 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Johnson Controls Metasys NAE55, SNE, and SNC engines, as well as Facility Explorer F4-SNC engines. The issue arises when invalid authentication credentials are sent to the login endpoint of affected versions prior to 11.0.6 and 12.0.4. Under these circumstances, the system can be forced into a denial-of-service (DoS) state due to resource exhaustion. This vulnerability does not require any authentication or user interaction to exploit, and the attack vector is network-based (AV:N), making it remotely exploitable over the network. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. The affected products are building automation and control systems widely used for managing HVAC, lighting, and other critical infrastructure in commercial and industrial environments. The vulnerability’s CVSS v3.1 base score is 7.5, reflecting its high severity due to ease of exploitation and significant impact on system availability. No known exploits in the wild have been reported as of the publication date. Johnson Controls has released fixed versions 11.0.6 and 12.0.4 to address this issue, but no direct patch links were provided in the source information.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of building management systems that are critical for operational continuity, energy management, and safety. Disruption of Metasys engines could lead to loss of control over HVAC, lighting, and other facility systems, potentially causing operational downtime, increased energy costs, and safety hazards. Critical infrastructure facilities, hospitals, data centers, and large commercial buildings relying on these systems could face operational interruptions. Given the remote exploitability and no requirement for authentication, attackers could launch DoS attacks from outside the network, potentially causing widespread service outages. This could also have cascading effects on business continuity and regulatory compliance, especially in sectors with strict uptime and safety requirements. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should prioritize upgrading affected Johnson Controls Metasys and Facility Explorer engines to versions 11.0.6 or 12.0.4 as soon as possible. Until patches are applied, network-level mitigations should be implemented, including restricting access to the login endpoints via firewall rules or network segmentation to trusted management networks only. Monitoring and alerting for unusual authentication attempts or spikes in login failures can help detect exploitation attempts early. Organizations should also conduct thorough asset inventories to identify all affected devices and ensure they are included in patch management processes. Additionally, implementing rate limiting or intrusion prevention systems (IPS) that can detect and block excessive invalid login attempts may reduce the risk of resource exhaustion. Regular backups and incident response plans should be updated to address potential DoS scenarios affecting building management systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jci
Date Reserved
2023-08-22T19:40:01.192Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68371692182aa0cae24f0c48

Added to database: 5/28/2025, 1:58:42 PM

Last enriched: 7/7/2025, 9:24:33 AM

Last updated: 8/17/2025, 3:00:50 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats