Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26381: CWE-425 Direct Request ('Forced Browsing') in Johnson Controls OpenBlue Workplace (formerly FM Systems)

0
Medium
VulnerabilityCVE-2025-26381cvecve-2025-26381cwe-425
Published: Wed Dec 17 2025 (12/17/2025, 16:13:38 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: OpenBlue Workplace (formerly FM Systems)

Description

Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:32:37 UTC

Technical Analysis

CVE-2025-26381 is a vulnerability classified under CWE-425, commonly known as Direct Request or Forced Browsing, affecting Johnson Controls OpenBlue Workplace (formerly FM Systems). This vulnerability arises when the application fails to properly enforce authorization checks on resource requests, allowing attackers to directly access URLs or endpoints that should be restricted. The vulnerability is exploitable over the network without requiring user interaction, and no privileges are needed initially, though partial authentication is required (AT:P). The CVSS 4.0 vector indicates high impact on confidentiality (VC:H), low impact on integrity (VI:L), and no impact on availability (VA:N). The scope is high (SC:H), meaning the vulnerability affects components beyond the initially vulnerable component, and the impact is limited to a low integrity impact on the system. The vulnerability was reserved in early 2025 and published in December 2025, with no patches or known exploits currently available. OpenBlue Workplace is a facility and workplace management platform used for smart building operations, including sensitive operational data and employee information. Exploiting this vulnerability could allow attackers to access sensitive data such as building access logs, employee schedules, or configuration files by bypassing normal access controls through forced browsing techniques. This type of attack typically involves guessing or enumerating URLs or resource identifiers that are not properly protected. Given the nature of the product and its deployment in critical infrastructure and corporate environments, unauthorized access could lead to privacy violations and potential operational disruptions if sensitive configuration data is exposed.

Potential Impact

For European organizations, the impact of CVE-2025-26381 could be significant, particularly in sectors relying on smart building management and workplace optimization, such as corporate offices, healthcare facilities, and government buildings. Unauthorized access to sensitive information could lead to privacy breaches involving employee data, operational intelligence, or security configurations. This could further facilitate lateral movement or targeted attacks within the network if attackers gain insight into building access controls or system configurations. The confidentiality impact is high, potentially exposing sensitive internal data. While integrity and availability impacts are low or none, the breach of confidentiality alone can have regulatory and reputational consequences, especially under GDPR and other European data protection laws. Organizations may face compliance issues and financial penalties if sensitive personal data is exposed. Additionally, attackers could leverage the information gained to plan more sophisticated attacks against physical security or IT infrastructure. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as threat actors often develop exploits after vulnerability publication.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement compensating controls immediately. These include: 1) Conducting a thorough audit of all URL endpoints and resource access controls within OpenBlue Workplace to ensure authorization checks are enforced consistently. 2) Implementing web application firewalls (WAFs) with rules to detect and block forced browsing attempts, such as unusual URL enumeration or direct access to restricted resources. 3) Enforcing strict authentication and session management policies to limit unauthorized access attempts. 4) Monitoring logs for anomalous access patterns indicative of forced browsing, including repeated 403/404 errors or access to sensitive endpoints. 5) Restricting network access to the OpenBlue Workplace application to trusted internal networks or VPNs where possible. 6) Engaging with Johnson Controls for timely updates and patches and planning rapid deployment once available. 7) Training security teams to recognize forced browsing attack vectors and respond promptly. These measures go beyond generic advice by focusing on access control validation, monitoring, and network segmentation tailored to the specific vulnerability context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-02-07T14:15:53.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6942d8c9b2cbfb3efaad4192

Added to database: 12/17/2025, 4:22:33 PM

Last enriched: 12/17/2025, 4:32:37 PM

Last updated: 12/18/2025, 7:46:29 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats