Skip to main content

CVE-2024-32754: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Johnson Controls Kantech KT1 Door Controller, Rev01

Low
VulnerabilityCVE-2024-32754cvecve-2024-32754cwe-200
Published: Thu Jul 04 2024 (07/04/2024, 10:43:46 UTC)
Source: CVE
Vendor/Project: Johnson Controls
Product: Kantech KT1 Door Controller, Rev01

Description

Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:04:49 UTC

Technical Analysis

CVE-2024-32754 is a vulnerability identified in the Johnson Controls Kantech KT1 Door Controller, Revision 01. The issue arises when the device is in its factory reset mode, awaiting initial setup. During this state, the controller broadcasts sensitive information including its MAC address, serial number, and firmware version over the network. This broadcast occurs only prior to configuration; once the device is set up, it ceases to transmit this data. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 3.1, indicating a low severity level. The vector string (AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) reflects that the attack vector requires adjacent network access, high attack complexity, no privileges, no user interaction, and impacts only confidentiality with low impact. No known exploits are currently reported in the wild, and no patches have been published yet. The exposure of MAC address, serial number, and firmware version could potentially aid an attacker in reconnaissance activities, such as identifying device presence, fingerprinting device versions, or planning targeted attacks. However, since the broadcast only occurs during factory reset mode, the window of exposure is limited. Additionally, the requirement for adjacent network access and high attack complexity reduces the likelihood of exploitation. The vulnerability does not affect the integrity or availability of the device, nor does it require authentication or user interaction to observe the broadcasted information.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to information disclosure during device provisioning phases. Organizations using the Kantech KT1 Door Controller in physical security infrastructure might inadvertently expose device identifiers and firmware details to nearby unauthorized actors during installation or reset procedures. This could facilitate targeted reconnaissance by adversaries aiming to map security infrastructure or identify devices with known firmware versions for future exploitation. However, since the exposure is limited to factory reset mode and requires proximity or access to the local network segment, the risk of widespread exploitation is low. The confidentiality impact is limited to device metadata rather than sensitive personal or operational data. There is no direct impact on system integrity or availability, so operational disruption is unlikely. European organizations with extensive physical security deployments in sensitive environments (e.g., government buildings, critical infrastructure, or corporate headquarters) should be aware that attackers with physical or network adjacency could gather device information during setup phases, potentially aiding in more sophisticated attacks later.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1. Physical Security Controls: Restrict physical and network access to areas where door controllers are installed, especially during installation or maintenance phases, to prevent unauthorized actors from being adjacent to the device during factory reset mode. 2. Network Segmentation: Ensure that the network segments used for device provisioning are isolated from general user or guest networks to limit exposure to unauthorized devices or actors. 3. Controlled Setup Procedures: Conduct device provisioning in secure, controlled environments where only authorized personnel are present. Avoid performing factory resets or initial setups in publicly accessible or unsecured locations. 4. Monitoring and Logging: Implement network monitoring to detect unusual broadcasts or device discovery attempts during provisioning windows. 5. Firmware Management: Although no patch is currently available, maintain close communication with Johnson Controls for updates or firmware patches addressing this issue. Plan to apply updates promptly once released. 6. Device Inventory and Tracking: Maintain an accurate inventory of all Kantech KT1 controllers and track their provisioning status to quickly identify devices in factory reset mode. 7. Vendor Engagement: Engage with Johnson Controls to inquire about potential firmware updates or configuration options that may suppress or encrypt broadcasted information during factory reset mode. These targeted mitigations go beyond generic advice by focusing on procedural controls during the vulnerable state and network architecture adjustments to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jci
Date Reserved
2024-04-17T17:26:35.180Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed196

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:04:49 PM

Last updated: 8/1/2025, 7:04:10 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats