CVE-2025-26381: CWE-425 Direct Request ('Forced Browsing') in Johnson Controls OpenBlue Workplace (formerly FM Systems)
CVE-2025-26381 is a medium severity vulnerability in Johnson Controls OpenBlue Workplace (formerly FM Systems) involving CWE-425 Direct Request ('Forced Browsing'). It allows unauthenticated attackers to bypass access controls and gain unauthorized access to sensitive information by directly requesting resources. The vulnerability does not require user interaction and has a CVSS 4. 0 base score of 6. 5, indicating moderate impact. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability affects version 0 of the product, suggesting early or initial releases. European organizations using OpenBlue Workplace for facility and workplace management could face confidentiality risks if exploited. Mitigation should focus on strict access control enforcement, monitoring for unusual direct resource requests, and applying vendor patches once available. Countries with significant deployments of Johnson Controls products and large commercial real estate sectors, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-26381 is a vulnerability categorized under CWE-425, commonly known as Direct Request or Forced Browsing, found in Johnson Controls OpenBlue Workplace (formerly FM Systems). This vulnerability allows attackers to bypass intended access controls by directly requesting URLs or resources that should be protected, thereby gaining unauthorized access to sensitive information. The vulnerability affects version 0 of the product, which may correspond to an early or initial release. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), does not require privileges (PR:N), nor user interaction (UI:N). However, it requires partial authentication (AT:P), meaning some form of authentication or session context might be needed but not elevated privileges. The impact on confidentiality is high (VC:H), while integrity and availability impacts are low to none. The scope is high (SC:H), indicating that exploitation could affect components beyond the initially vulnerable one, and the impact is limited to low integrity and no availability impact. No known exploits are currently in the wild, and no patches have been released yet, which suggests organizations need to be vigilant and prepare for remediation. The vulnerability arises from insufficient authorization checks when accessing resources directly, allowing attackers to enumerate or access sensitive data that should be restricted. This type of vulnerability is particularly dangerous in workplace management systems that handle sensitive employee, facility, or operational data.
Potential Impact
For European organizations, the exploitation of CVE-2025-26381 could lead to unauthorized disclosure of sensitive workplace and facility management information, potentially including employee data, building access details, and operational configurations. This could result in privacy violations, regulatory non-compliance (e.g., GDPR), and increased risk of targeted attacks leveraging the exposed information. Organizations relying on OpenBlue Workplace for critical facility management might face operational risks if attackers gain insights into security configurations or schedules. The confidentiality breach could also damage organizational reputation and trust. Given the medium severity and lack of known exploits, the immediate risk is moderate but could escalate if exploit code becomes publicly available. The vulnerability's ease of exploitation without elevated privileges and user interaction increases the likelihood of automated scanning and exploitation attempts, especially in environments exposed to the internet or insufficiently segmented networks.
Mitigation Recommendations
1. Implement strict access control policies and ensure that all resource requests are properly authorized on the server side, not relying solely on client-side controls or obscurity. 2. Conduct thorough security testing and code reviews focusing on authorization logic, especially for direct URL or resource access. 3. Monitor web server logs and application access logs for unusual or repeated direct requests to sensitive resources that could indicate forced browsing attempts. 4. Segment and isolate the OpenBlue Workplace system from public-facing networks where possible, limiting exposure. 5. Apply any vendor patches or updates promptly once released. 6. Employ Web Application Firewalls (WAFs) with rules to detect and block forced browsing patterns. 7. Educate administrators and security teams about this vulnerability to recognize potential exploitation signs. 8. Consider implementing multi-factor authentication and session management improvements to reduce the risk of unauthorized access. 9. Perform regular vulnerability assessments and penetration testing targeting authorization bypass scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-26381: CWE-425 Direct Request ('Forced Browsing') in Johnson Controls OpenBlue Workplace (formerly FM Systems)
Description
CVE-2025-26381 is a medium severity vulnerability in Johnson Controls OpenBlue Workplace (formerly FM Systems) involving CWE-425 Direct Request ('Forced Browsing'). It allows unauthenticated attackers to bypass access controls and gain unauthorized access to sensitive information by directly requesting resources. The vulnerability does not require user interaction and has a CVSS 4. 0 base score of 6. 5, indicating moderate impact. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability affects version 0 of the product, suggesting early or initial releases. European organizations using OpenBlue Workplace for facility and workplace management could face confidentiality risks if exploited. Mitigation should focus on strict access control enforcement, monitoring for unusual direct resource requests, and applying vendor patches once available. Countries with significant deployments of Johnson Controls products and large commercial real estate sectors, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-26381 is a vulnerability categorized under CWE-425, commonly known as Direct Request or Forced Browsing, found in Johnson Controls OpenBlue Workplace (formerly FM Systems). This vulnerability allows attackers to bypass intended access controls by directly requesting URLs or resources that should be protected, thereby gaining unauthorized access to sensitive information. The vulnerability affects version 0 of the product, which may correspond to an early or initial release. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), does not require privileges (PR:N), nor user interaction (UI:N). However, it requires partial authentication (AT:P), meaning some form of authentication or session context might be needed but not elevated privileges. The impact on confidentiality is high (VC:H), while integrity and availability impacts are low to none. The scope is high (SC:H), indicating that exploitation could affect components beyond the initially vulnerable one, and the impact is limited to low integrity and no availability impact. No known exploits are currently in the wild, and no patches have been released yet, which suggests organizations need to be vigilant and prepare for remediation. The vulnerability arises from insufficient authorization checks when accessing resources directly, allowing attackers to enumerate or access sensitive data that should be restricted. This type of vulnerability is particularly dangerous in workplace management systems that handle sensitive employee, facility, or operational data.
Potential Impact
For European organizations, the exploitation of CVE-2025-26381 could lead to unauthorized disclosure of sensitive workplace and facility management information, potentially including employee data, building access details, and operational configurations. This could result in privacy violations, regulatory non-compliance (e.g., GDPR), and increased risk of targeted attacks leveraging the exposed information. Organizations relying on OpenBlue Workplace for critical facility management might face operational risks if attackers gain insights into security configurations or schedules. The confidentiality breach could also damage organizational reputation and trust. Given the medium severity and lack of known exploits, the immediate risk is moderate but could escalate if exploit code becomes publicly available. The vulnerability's ease of exploitation without elevated privileges and user interaction increases the likelihood of automated scanning and exploitation attempts, especially in environments exposed to the internet or insufficiently segmented networks.
Mitigation Recommendations
1. Implement strict access control policies and ensure that all resource requests are properly authorized on the server side, not relying solely on client-side controls or obscurity. 2. Conduct thorough security testing and code reviews focusing on authorization logic, especially for direct URL or resource access. 3. Monitor web server logs and application access logs for unusual or repeated direct requests to sensitive resources that could indicate forced browsing attempts. 4. Segment and isolate the OpenBlue Workplace system from public-facing networks where possible, limiting exposure. 5. Apply any vendor patches or updates promptly once released. 6. Employ Web Application Firewalls (WAFs) with rules to detect and block forced browsing patterns. 7. Educate administrators and security teams about this vulnerability to recognize potential exploitation signs. 8. Consider implementing multi-factor authentication and session management improvements to reduce the risk of unauthorized access. 9. Perform regular vulnerability assessments and penetration testing targeting authorization bypass scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2025-02-07T14:15:53.880Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6942d8c9b2cbfb3efaad4192
Added to database: 12/17/2025, 4:22:33 PM
Last enriched: 12/24/2025, 5:06:03 PM
Last updated: 2/7/2026, 1:29:06 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.