Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0658: CWE-20 Improper Input Validation in Automated Logic Zone Controllers

0
High
VulnerabilityCVE-2025-0658cvecve-2025-0658cwe-20
Published: Thu Nov 27 2025 (11/27/2025, 01:00:16 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: Zone Controllers

Description

A vulnerability in Automated Logic and Carrier's Zone Controller via BACnet protocol causes the device to crash. The device enters a fault state; after a reset, a second packet can leave it permanently unresponsive until a manual power cycle is performed.

AI-Powered Analysis

AILast updated: 11/27/2025, 01:24:54 UTC

Technical Analysis

CVE-2025-0658 is a vulnerability identified in Automated Logic and Carrier's Zone Controllers, which are devices used in building automation systems to control HVAC and other environmental parameters. The vulnerability arises from improper input validation (CWE-20) in the handling of BACnet protocol packets. Specifically, the device can be forced to crash and enter a fault state upon receiving a maliciously crafted BACnet packet. After the device is reset, a second malicious packet can cause the device to become permanently unresponsive until a manual power cycle is performed, effectively causing a denial of service. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v4.0 score of 8.7 reflects the high impact on availability (VA:H) with no impact on confidentiality or integrity. The scope is unchanged, meaning the vulnerability affects only the vulnerable component. No patches or known exploits are currently available, but the risk is significant given the critical role these controllers play in managing building environments. The lack of authentication and ease of exploitation make this vulnerability a serious concern for operational continuity in facilities using these devices.

Potential Impact

For European organizations, the primary impact is a denial of service on building automation systems that rely on Automated Logic Zone Controllers. This can disrupt HVAC operations, leading to uncomfortable or unsafe environmental conditions, potential damage to sensitive equipment, and increased energy costs. Critical infrastructure facilities such as hospitals, data centers, and manufacturing plants could face operational disruptions. The need for manual power cycling to recover devices increases operational overhead and response time, potentially extending downtime. Additionally, widespread exploitation could lead to cascading failures in integrated building management systems. The lack of confidentiality or integrity impact limits data breach concerns, but availability degradation alone can have significant safety and financial consequences. Organizations in Europe with extensive BACnet deployments or reliance on Automated Logic products are particularly vulnerable.

Mitigation Recommendations

1. Implement strict network segmentation to isolate BACnet traffic and limit exposure of Zone Controllers to untrusted networks. 2. Deploy network monitoring and intrusion detection systems capable of analyzing BACnet protocol traffic to detect anomalous or malformed packets indicative of exploitation attempts. 3. Establish incident response procedures to quickly identify and manually power cycle affected devices if they become unresponsive. 4. Engage with the vendor (Automated Logic/Carrier) for updates on patches or firmware upgrades addressing this vulnerability and apply them promptly once available. 5. Restrict access to BACnet devices using firewall rules and VPNs to trusted personnel and systems only. 6. Conduct regular security assessments and penetration testing focused on building automation systems to identify and remediate similar vulnerabilities. 7. Maintain detailed asset inventories to ensure all Zone Controllers are accounted for and monitored. 8. Train operational technology (OT) staff on recognizing symptoms of this vulnerability exploitation and appropriate response actions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Carrier
Date Reserved
2025-01-22T20:22:16.305Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6927a51dd322a87b22026c12

Added to database: 11/27/2025, 1:10:53 AM

Last enriched: 11/27/2025, 1:24:54 AM

Last updated: 11/27/2025, 3:35:01 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats