Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43876: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Controls iSTAR Ultra, iSTAR Ultra SE

0
High
VulnerabilityCVE-2025-43876cvecve-2025-43876cwe-78
Published: Wed Dec 24 2025 (12/24/2025, 15:27:06 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: iSTAR Ultra, iSTAR Ultra SE

Description

Under certain circumstances a successful exploitation could result in access to the device.

AI-Powered Analysis

AILast updated: 12/24/2025, 15:55:55 UTC

Technical Analysis

CVE-2025-43876 is an OS command injection vulnerability classified under CWE-78, affecting Johnson Controls iSTAR Ultra and iSTAR Ultra SE access control devices. The vulnerability stems from improper neutralization of special characters in operating system commands, which allows an attacker to inject and execute arbitrary OS commands. The CVSS 4.0 score of 8.7 (high severity) reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no required authentication (AT:N), and no user interaction (UI:N). However, it requires low privileges (PR:L), indicating that an attacker must have some limited access to the device or network to exploit it. The impact metrics indicate high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H), meaning exploitation could fully compromise the device and its functions. The vulnerability does not require user interaction or scope changes, making it a direct threat to the affected devices. The iSTAR Ultra series are widely used in physical security systems for access control, making this vulnerability critical as it could allow attackers to bypass security controls, manipulate access permissions, or disrupt security operations. No patches or known exploits are currently available, but the vulnerability's nature suggests it could be weaponized once exploit code is developed.

Potential Impact

For European organizations, the impact of CVE-2025-43876 could be severe, especially for those relying on Johnson Controls iSTAR Ultra and iSTAR Ultra SE devices for physical security and access control. Exploitation could lead to unauthorized access to secure facilities, manipulation or disabling of access control systems, and potential lateral movement within corporate networks. This could result in data breaches, theft of intellectual property, or sabotage of critical infrastructure. The high confidentiality, integrity, and availability impact ratings indicate that attackers could gain full control over the affected devices, undermining trust in physical security measures. Organizations in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk. The lack of patches increases the urgency for proactive mitigation. Additionally, the vulnerability could be exploited as part of a multi-stage attack targeting broader network compromise or espionage campaigns within Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to iSTAR Ultra devices by isolating them on dedicated VLANs or network segments with strict firewall rules, limiting communication to only trusted management stations. Enforce strong authentication and authorization policies to minimize the number of users with even low-level privileges on these devices. Monitor device logs and network traffic for unusual command execution patterns or unexpected connections indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect OS command injection signatures. Regularly audit device configurations and firmware versions to identify any unauthorized changes. Coordinate with Johnson Controls for timely updates and subscribe to their security advisories. Consider deploying endpoint detection and response (EDR) solutions on management workstations to detect lateral movement attempts. Finally, develop and test incident response plans specifically addressing potential physical security system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-04-17T20:07:25.122Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694c098b550a31ae84b9ba46

Added to database: 12/24/2025, 3:40:59 PM

Last enriched: 12/24/2025, 3:55:55 PM

Last updated: 12/24/2025, 5:07:53 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats