CVE-2025-43873: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Control iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2
CVE-2025-43873 is a high-severity OS command injection vulnerability affecting multiple Johnson Control iSTAR Ultra series devices. Exploitation requires no user interaction but does require low-level privileges, allowing attackers to execute arbitrary OS commands. Successful exploitation could lead to firmware modification and full device compromise. The vulnerability impacts device confidentiality, integrity, and availability, posing significant risks to physical security systems relying on these devices. No known exploits are currently reported in the wild. European organizations using these access control systems, especially in critical infrastructure and large enterprises, face elevated risks. Mitigation requires applying vendor patches once available, restricting network access to management interfaces, and monitoring for anomalous device behavior. Countries with high deployment of Johnson Controls security products and critical infrastructure sectors, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Given the ease of exploitation and potential impact, this vulnerability demands urgent attention from defenders.
AI Analysis
Technical Summary
CVE-2025-43873 is an OS command injection vulnerability (CWE-78) identified in several Johnson Control iSTAR Ultra series devices, including iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, and iSTAR Edge G2. The vulnerability arises from improper neutralization of special elements in OS commands, allowing an attacker with low-level privileges to inject and execute arbitrary commands on the underlying operating system. This can lead to unauthorized modification of device firmware, effectively granting full control over the affected device. The CVSS 4.0 base score of 8.7 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:L) beyond low-level access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as attackers can alter firmware and potentially disrupt or manipulate physical access control systems. Although no public exploits are currently known, the nature of the vulnerability makes it a critical risk once weaponized. The affected devices are widely used in physical security environments to control access to buildings and secure areas, making this vulnerability a significant threat to organizational security postures. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-43873 is substantial. These devices often serve as critical components in physical security infrastructures, controlling access to sensitive facilities such as data centers, government buildings, and industrial plants. Successful exploitation could allow attackers to bypass physical security controls by modifying firmware, potentially enabling unauthorized entry or disabling security mechanisms. This could lead to theft, espionage, sabotage, or disruption of essential services. The compromise of device integrity also undermines trust in security monitoring and incident response capabilities. Given the high integration of Johnson Controls products in Europe’s critical infrastructure sectors, including energy, transportation, and public administration, the vulnerability poses a direct threat to national security and business continuity. Additionally, the ability to execute OS commands remotely without user interaction increases the likelihood of automated or large-scale attacks, amplifying potential damage.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of affected iSTAR Ultra devices using network segmentation and firewall rules, allowing only trusted administrative hosts. 2. Implement strict access controls and monitoring on devices to detect anomalous command execution or firmware changes. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting OS command injection patterns specific to these devices. 4. Coordinate with Johnson Controls to obtain and apply security patches or firmware updates as soon as they become available. 5. Conduct thorough audits of device configurations and logs to identify any signs of compromise or attempted exploitation. 6. Employ multi-factor authentication and limit administrative privileges to reduce the risk of privilege escalation. 7. Consider temporary compensating controls such as disabling remote management features if not essential. 8. Train security teams on the specifics of this vulnerability to enhance detection and response capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-43873: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Control iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2
Description
CVE-2025-43873 is a high-severity OS command injection vulnerability affecting multiple Johnson Control iSTAR Ultra series devices. Exploitation requires no user interaction but does require low-level privileges, allowing attackers to execute arbitrary OS commands. Successful exploitation could lead to firmware modification and full device compromise. The vulnerability impacts device confidentiality, integrity, and availability, posing significant risks to physical security systems relying on these devices. No known exploits are currently reported in the wild. European organizations using these access control systems, especially in critical infrastructure and large enterprises, face elevated risks. Mitigation requires applying vendor patches once available, restricting network access to management interfaces, and monitoring for anomalous device behavior. Countries with high deployment of Johnson Controls security products and critical infrastructure sectors, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Given the ease of exploitation and potential impact, this vulnerability demands urgent attention from defenders.
AI-Powered Analysis
Technical Analysis
CVE-2025-43873 is an OS command injection vulnerability (CWE-78) identified in several Johnson Control iSTAR Ultra series devices, including iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, and iSTAR Edge G2. The vulnerability arises from improper neutralization of special elements in OS commands, allowing an attacker with low-level privileges to inject and execute arbitrary commands on the underlying operating system. This can lead to unauthorized modification of device firmware, effectively granting full control over the affected device. The CVSS 4.0 base score of 8.7 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no privileges required (PR:L) beyond low-level access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as attackers can alter firmware and potentially disrupt or manipulate physical access control systems. Although no public exploits are currently known, the nature of the vulnerability makes it a critical risk once weaponized. The affected devices are widely used in physical security environments to control access to buildings and secure areas, making this vulnerability a significant threat to organizational security postures. The lack of available patches at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2025-43873 is substantial. These devices often serve as critical components in physical security infrastructures, controlling access to sensitive facilities such as data centers, government buildings, and industrial plants. Successful exploitation could allow attackers to bypass physical security controls by modifying firmware, potentially enabling unauthorized entry or disabling security mechanisms. This could lead to theft, espionage, sabotage, or disruption of essential services. The compromise of device integrity also undermines trust in security monitoring and incident response capabilities. Given the high integration of Johnson Controls products in Europe’s critical infrastructure sectors, including energy, transportation, and public administration, the vulnerability poses a direct threat to national security and business continuity. Additionally, the ability to execute OS commands remotely without user interaction increases the likelihood of automated or large-scale attacks, amplifying potential damage.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of affected iSTAR Ultra devices using network segmentation and firewall rules, allowing only trusted administrative hosts. 2. Implement strict access controls and monitoring on devices to detect anomalous command execution or firmware changes. 3. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting OS command injection patterns specific to these devices. 4. Coordinate with Johnson Controls to obtain and apply security patches or firmware updates as soon as they become available. 5. Conduct thorough audits of device configurations and logs to identify any signs of compromise or attempted exploitation. 6. Employ multi-factor authentication and limit administrative privileges to reduce the risk of privilege escalation. 7. Consider temporary compensating controls such as disabling remote management features if not essential. 8. Train security teams on the specifics of this vulnerability to enhance detection and response capabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2025-04-17T20:07:25.122Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6942d536b2cbfb3efaa86de8
Added to database: 12/17/2025, 4:07:18 PM
Last enriched: 12/24/2025, 5:06:23 PM
Last updated: 2/5/2026, 5:56:29 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
HighCVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
HighCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.