Skip to main content

CVE-2025-53695: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Controls, Inc iSTAR Ultra

Critical
VulnerabilityCVE-2025-53695cvecve-2025-53695cwe-78
Published: Mon Jul 28 2025 (07/28/2025, 14:05:36 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls, Inc
Product: iSTAR Ultra

Description

OS Command Injection in iSTAR Ultra products web application allows an authenticated attacker to gain even more privileged access ('root' user) to the device firmware.

AI-Powered Analysis

AILast updated: 07/28/2025, 14:33:00 UTC

Technical Analysis

CVE-2025-53695 is a critical OS Command Injection vulnerability identified in the web application component of Johnson Controls, Inc's iSTAR Ultra product line. This vulnerability is classified under CWE-78, which involves improper neutralization of special elements used in operating system commands. The flaw allows an authenticated attacker—who already has some level of access—to execute arbitrary OS commands with escalated privileges, specifically gaining root-level access to the device firmware. The vulnerability is remotely exploitable over the network without requiring user interaction, and no additional authentication beyond existing access is needed. The CVSS 4.0 base score is 9.4, reflecting its critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no attack prerequisites (AT:N), and high impacts on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The scope is high, indicating that the vulnerability affects components beyond the initially vulnerable component, potentially compromising the entire device. The iSTAR Ultra is a security and access control product commonly deployed in physical security environments, including enterprise and critical infrastructure facilities. The vulnerability's exploitation could allow attackers to take full control of the device firmware, bypass security controls, manipulate access permissions, and potentially pivot into broader network environments. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make it a significant threat once weaponized. No patches have been publicly released yet, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, the impact of this vulnerability is substantial, particularly for those relying on Johnson Controls' iSTAR Ultra products for physical security and access control. Successful exploitation could lead to unauthorized physical access, manipulation of security policies, and disruption of facility operations. This could compromise sensitive areas such as data centers, government buildings, transportation hubs, and critical infrastructure sites. The root-level access to device firmware also opens the door for persistent backdoors, firmware tampering, and lateral movement within corporate or industrial networks. Given the integration of these devices in security-critical environments, the confidentiality, integrity, and availability of both physical and cyber assets are at risk. Additionally, regulatory compliance obligations under GDPR and other European cybersecurity directives may be impacted if breaches occur due to this vulnerability. The lack of a patch and the critical severity necessitate immediate attention to prevent potential exploitation and cascading effects on organizational security posture.

Mitigation Recommendations

1. Immediate Network Segmentation: Isolate iSTAR Ultra devices from general network access, restricting management interfaces to trusted administrative networks only. 2. Access Control Hardening: Enforce strict authentication and authorization policies for accessing the device web application, including multi-factor authentication where possible. 3. Monitor and Log: Implement enhanced logging and real-time monitoring of access attempts and command executions on iSTAR Ultra devices to detect suspicious activities early. 4. Firmware Integrity Checks: Regularly verify firmware integrity using cryptographic hashes or vendor-provided tools to detect unauthorized modifications. 5. Vendor Coordination: Engage with Johnson Controls for updates on patches or firmware updates addressing CVE-2025-53695 and apply them promptly once available. 6. Incident Response Preparedness: Develop and test incident response plans specific to physical security device compromises, including containment and recovery procedures. 7. Limit Privileged Access: Restrict the number of users with administrative privileges on the devices to minimize attack surface. 8. Network Intrusion Detection: Deploy IDS/IPS solutions capable of detecting command injection patterns or anomalous traffic targeting iSTAR Ultra devices. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of immediate patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Dragos
Date Reserved
2025-07-08T14:48:42.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68878682ad5a09ad00842ff7

Added to database: 7/28/2025, 2:17:38 PM

Last enriched: 7/28/2025, 2:33:00 PM

Last updated: 7/28/2025, 2:47:38 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats