Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43873: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Control iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2

0
High
VulnerabilityCVE-2025-43873cvecve-2025-43873cwe-78
Published: Wed Dec 17 2025 (12/17/2025, 15:53:04 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Control
Product: iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2

Description

CVE-2025-43873 is a high-severity OS command injection vulnerability affecting multiple Johnson Control iSTAR Ultra series devices. Exploitation requires no user interaction but does require low-level privileges, allowing attackers to execute arbitrary OS commands. Successful exploitation could lead to firmware modification and full device compromise. The vulnerability impacts device confidentiality, integrity, and availability, posing significant risks to physical security systems relying on these devices. No known exploits are currently reported in the wild. European organizations using these access control systems, especially in critical infrastructure and large enterprises, face elevated risks. Mitigation requires applying vendor patches once available, restricting network access to management interfaces, and monitoring for anomalous device behavior. Countries with high deployment of Johnson Controls security products and critical infrastructure sectors, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Given the ease of exploitation and potential impact, this vulnerability demands urgent attention from defenders.

AI-Powered Analysis

AILast updated: 12/24/2025, 17:06:23 UTC

Technical Analysis

CVE-2025-43873 is an OS command injection vulnerability (CWE-78) identified in several Johnson Control iSTAR Ultra series devices, including iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, and iSTAR Edge G2. The vulnerability arises from improper neutralization of special elements in OS commands, allowing an attacker with low-level privileges to inject and execute arbitrary commands on the underlying operating system. This can lead to unauthorized modification of device firmware, effectively granting full control over the affected device. The CVSS 4.0 base score of 8.7 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:L) beyond low-level access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as attackers can alter firmware and potentially disrupt or manipulate physical access control systems. Although no public exploits are currently known, the nature of the vulnerability makes it a critical risk once weaponized. The affected devices are widely used in physical security environments to control access to buildings and secure areas, making this vulnerability a significant threat to organizational security postures. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2025-43873 is substantial. These devices often serve as critical components in physical security infrastructures, controlling access to sensitive facilities such as data centers, government buildings, and industrial plants. Successful exploitation could allow attackers to bypass physical security controls by modifying firmware, potentially enabling unauthorized entry or disabling security mechanisms. This could lead to theft, espionage, sabotage, or disruption of essential services. The compromise of device integrity also undermines trust in security monitoring and incident response capabilities. Given the high integration of Johnson Controls products in Europe’s critical infrastructure sectors, including energy, transportation, and public administration, the vulnerability poses a direct threat to national security and business continuity. Additionally, the ability to execute OS commands remotely without user interaction increases the likelihood of automated or large-scale attacks, amplifying potential damage.

Mitigation Recommendations

1. Immediately restrict network access to the management interfaces of affected iSTAR Ultra devices using network segmentation and firewall rules, allowing only trusted administrative hosts. 2. Implement strict access controls and monitoring on devices to detect anomalous command execution or firmware changes. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting OS command injection patterns specific to these devices. 4. Coordinate with Johnson Controls to obtain and apply security patches or firmware updates as soon as they become available. 5. Conduct thorough audits of device configurations and logs to identify any signs of compromise or attempted exploitation. 6. Employ multi-factor authentication and limit administrative privileges to reduce the risk of privilege escalation. 7. Consider temporary compensating controls such as disabling remote management features if not essential. 8. Train security teams on the specifics of this vulnerability to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-04-17T20:07:25.122Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6942d536b2cbfb3efaa86de8

Added to database: 12/17/2025, 4:07:18 PM

Last enriched: 12/24/2025, 5:06:23 PM

Last updated: 2/5/2026, 5:56:29 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats