Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26385: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Johnson Controls Metasys

0
Critical
VulnerabilityCVE-2025-26385cvecve-2025-26385cwe-77
Published: Fri Jan 30 2026 (01/30/2026, 11:05:16 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Metasys

Description

Johnson Controls Metasys component listed below have Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability . Successful exploitation of this vulnerability could allow remote SQL execution This issue affects  * Metasys: Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation,  * Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation,  * LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1,  * System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior,  * Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior.

AI-Powered Analysis

AILast updated: 01/30/2026, 11:27:33 UTC

Technical Analysis

CVE-2025-26385 is a command injection vulnerability classified under CWE-77 affecting Johnson Controls Metasys products that deploy SQL Express as part of their installation. The affected components include the Application and Data Server (ADS), Extended Application and Data Server (ADX), LCS8500 or NAE8500 controllers, System Configuration Tool (SCT), and Controller Configuration Tool (CCT) across versions 12.0 through 14.1 or 17.1 depending on the product. The vulnerability arises from improper neutralization of special elements in commands, allowing an attacker to inject malicious SQL commands remotely. This can lead to unauthorized SQL execution, enabling attackers to manipulate or exfiltrate data, disrupt system operations, or potentially gain further access within the network. The flaw requires no authentication or user interaction and can be exploited over the network, increasing the attack surface significantly. The CVSS 4.0 base score of 9.5 reflects its critical severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. Although no public exploits are currently reported, the widespread use of Metasys in building automation systems makes this vulnerability a significant threat. The lack of available patches at the time of publication necessitates immediate mitigation through compensating controls.

Potential Impact

For European organizations, this vulnerability poses a critical risk to building management and automation systems that rely on Johnson Controls Metasys products. Successful exploitation could lead to unauthorized access to sensitive operational data, manipulation of building controls (such as HVAC, lighting, and security systems), and potential disruption of critical infrastructure services. This could affect commercial buildings, hospitals, data centers, and industrial facilities, leading to operational downtime, safety hazards, and financial losses. The ability to execute arbitrary SQL commands remotely without authentication increases the likelihood of attacks from external threat actors, including cybercriminals and nation-state actors. Given the integration of Metasys in many smart building environments across Europe, the impact extends to privacy concerns, regulatory compliance issues (e.g., GDPR), and potential cascading effects on other connected systems.

Mitigation Recommendations

1. Apply vendor patches immediately once available to remediate the vulnerability. 2. Until patches are released, isolate Metasys components from untrusted networks using strict network segmentation and firewall rules to limit exposure. 3. Implement robust network monitoring and intrusion detection systems to identify suspicious SQL commands or unusual traffic patterns targeting Metasys servers. 4. Restrict access to Metasys management interfaces to trusted administrators only, employing VPNs or zero-trust network access where possible. 5. Conduct regular security audits and vulnerability assessments on building automation systems to detect potential exploitation attempts. 6. Harden SQL Express configurations by disabling unnecessary features and enforcing least privilege principles on database accounts used by Metasys components. 7. Educate operational technology (OT) and IT teams on this vulnerability and establish incident response plans specific to building management system compromises. 8. Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-02-07T14:15:53.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697c9243ac063202224f3c28

Added to database: 1/30/2026, 11:13:07 AM

Last enriched: 1/30/2026, 11:27:33 AM

Last updated: 1/30/2026, 6:32:32 PM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats