Skip to main content

CVE-2024-32752: CWE-306: Missing Authentication for Critical Function in Johnson Controls iSTAR Configuration Utility (ICU)

Critical
Published: Thu Jun 06 2024 (06/06/2024, 20:49:53 UTC)
Source: CVE
Vendor/Project: Johnson Controls
Product: iSTAR Configuration Utility (ICU)

Description

The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access

AI-Powered Analysis

AILast updated: 06/22/2025, 04:07:28 UTC

Technical Analysis

CVE-2024-32752 is a critical vulnerability identified in the Johnson Controls iSTAR Configuration Utility (ICU), specifically affecting iSTAR door controllers running firmware versions prior to 6.6.B. The core issue is the lack of authentication for critical functions within the ICU, classified under CWE-306 (Missing Authentication for Critical Function). This means that the communication between the ICU and the door controllers is unauthenticated, allowing an attacker to interact with the system without any credentials or user interaction. The vulnerability has a CVSS 3.1 base score of 9.1, indicating critical severity. The vector details (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) reveal that the attack can be performed remotely over the network with low attack complexity, no privileges, and no user interaction required. While confidentiality is not directly impacted (C:N), the integrity and availability of the affected systems are severely compromised (I:H/A:H). An attacker exploiting this vulnerability could manipulate door controller configurations, potentially disabling security controls, locking or unlocking doors arbitrarily, or causing denial of service by disrupting access control systems. Given that these controllers are integral to physical security infrastructure, the impact extends beyond IT systems to physical premises security. No patches or mitigations are currently linked, and no known exploits are reported in the wild as of the publication date (June 6, 2024). However, the criticality and ease of exploitation make this a high-priority vulnerability for organizations using affected Johnson Controls products.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on Johnson Controls iSTAR door controllers for physical access management in critical infrastructure, government buildings, corporate headquarters, and industrial facilities. Exploitation could lead to unauthorized physical access, enabling theft, espionage, sabotage, or safety risks to personnel. The integrity of access control systems could be compromised, allowing attackers to alter configurations or disable security mechanisms without detection. Availability impacts could result in denial of access to authorized personnel, disrupting business operations or emergency responses. Given the increasing convergence of physical and cybersecurity, such a vulnerability could also facilitate lateral movement into IT networks if physical access is gained. The lack of authentication means attackers do not require insider credentials or user interaction, increasing the risk of automated or remote attacks. This vulnerability poses a direct threat to the security posture of organizations in sectors such as finance, healthcare, energy, transportation, and government within Europe.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should prioritize upgrading all iSTAR door controllers to firmware version 6.6.B or later, where authentication mechanisms are implemented. 2. Network segmentation: Isolate iSTAR controllers and ICU management interfaces on dedicated, secured network segments with strict access controls to limit exposure to untrusted networks. 3. Access control enforcement: Implement strong network-level access controls such as firewalls and VPNs to restrict management interface access only to authorized personnel and systems. 4. Monitoring and logging: Enable detailed logging of ICU communications and monitor for unusual or unauthorized access attempts to detect exploitation attempts early. 5. Physical security audits: Conduct regular audits of physical access points controlled by iSTAR devices to identify anomalies or unauthorized changes. 6. Incident response readiness: Prepare incident response plans specifically addressing potential physical access breaches stemming from this vulnerability. 7. Vendor engagement: Maintain communication with Johnson Controls for official patches, updates, and security advisories. 8. Temporary compensating controls: If immediate firmware updates are not feasible, consider disabling remote management interfaces or restricting them to highly trusted networks until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jci
Date Reserved
2024-04-17T17:26:35.180Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf08f3

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/22/2025, 4:07:28 AM

Last updated: 8/12/2025, 5:45:56 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats