Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26381: CWE-425 Direct Request ('Forced Browsing') in Johnson Controls OpenBlue Workplace (formerly FM Systems)

0
Medium
VulnerabilityCVE-2025-26381cvecve-2025-26381cwe-425
Published: Wed Dec 17 2025 (12/17/2025, 16:13:38 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: OpenBlue Workplace (formerly FM Systems)

Description

CVE-2025-26381 is a medium severity vulnerability in Johnson Controls OpenBlue Workplace (formerly FM Systems) involving CWE-425 Direct Request ('Forced Browsing'). It allows unauthenticated attackers to bypass access controls and gain unauthorized access to sensitive information by directly requesting resources. The vulnerability does not require user interaction and has a CVSS 4. 0 base score of 6. 5, indicating moderate impact. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability affects version 0 of the product, suggesting early or initial releases. European organizations using OpenBlue Workplace for facility and workplace management could face confidentiality risks if exploited. Mitigation should focus on strict access control enforcement, monitoring for unusual direct resource requests, and applying vendor patches once available. Countries with significant deployments of Johnson Controls products and large commercial real estate sectors, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/24/2025, 17:06:03 UTC

Technical Analysis

CVE-2025-26381 is a vulnerability categorized under CWE-425, commonly known as Direct Request or Forced Browsing, found in Johnson Controls OpenBlue Workplace (formerly FM Systems). This vulnerability allows attackers to bypass intended access controls by directly requesting URLs or resources that should be protected, thereby gaining unauthorized access to sensitive information. The vulnerability affects version 0 of the product, which may correspond to an early or initial release. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), does not require privileges (PR:N), nor user interaction (UI:N). However, it requires partial authentication (AT:P), meaning some form of authentication or session context might be needed but not elevated privileges. The impact on confidentiality is high (VC:H), while integrity and availability impacts are low to none. The scope is high (SC:H), indicating that exploitation could affect components beyond the initially vulnerable one, and the impact is limited to low integrity and no availability impact. No known exploits are currently in the wild, and no patches have been released yet, which suggests organizations need to be vigilant and prepare for remediation. The vulnerability arises from insufficient authorization checks when accessing resources directly, allowing attackers to enumerate or access sensitive data that should be restricted. This type of vulnerability is particularly dangerous in workplace management systems that handle sensitive employee, facility, or operational data.

Potential Impact

For European organizations, the exploitation of CVE-2025-26381 could lead to unauthorized disclosure of sensitive workplace and facility management information, potentially including employee data, building access details, and operational configurations. This could result in privacy violations, regulatory non-compliance (e.g., GDPR), and increased risk of targeted attacks leveraging the exposed information. Organizations relying on OpenBlue Workplace for critical facility management might face operational risks if attackers gain insights into security configurations or schedules. The confidentiality breach could also damage organizational reputation and trust. Given the medium severity and lack of known exploits, the immediate risk is moderate but could escalate if exploit code becomes publicly available. The vulnerability's ease of exploitation without elevated privileges and user interaction increases the likelihood of automated scanning and exploitation attempts, especially in environments exposed to the internet or insufficiently segmented networks.

Mitigation Recommendations

1. Implement strict access control policies and ensure that all resource requests are properly authorized on the server side, not relying solely on client-side controls or obscurity. 2. Conduct thorough security testing and code reviews focusing on authorization logic, especially for direct URL or resource access. 3. Monitor web server logs and application access logs for unusual or repeated direct requests to sensitive resources that could indicate forced browsing attempts. 4. Segment and isolate the OpenBlue Workplace system from public-facing networks where possible, limiting exposure. 5. Apply any vendor patches or updates promptly once released. 6. Employ Web Application Firewalls (WAFs) with rules to detect and block forced browsing patterns. 7. Educate administrators and security teams about this vulnerability to recognize potential exploitation signs. 8. Consider implementing multi-factor authentication and session management improvements to reduce the risk of unauthorized access. 9. Perform regular vulnerability assessments and penetration testing targeting authorization bypass scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-02-07T14:15:53.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6942d8c9b2cbfb3efaad4192

Added to database: 12/17/2025, 4:22:33 PM

Last enriched: 12/24/2025, 5:06:03 PM

Last updated: 2/7/2026, 1:29:06 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats