Skip to main content

CVE-2025-53696: CWE-494 Download of Code Without Integrity Check in Johnson Controls, Inc iSTAR Ultra

Critical
VulnerabilityCVE-2025-53696cvecve-2025-53696cwe-494
Published: Mon Jul 28 2025 (07/28/2025, 14:43:01 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls, Inc
Product: iSTAR Ultra

Description

iSTAR Ultra performs a firmware verification on boot, however the verification does not inspect certain portions of the firmware. These firmware parts may contain malicious code. Tested up to firmware 6.9.2, later firmwares are also possibly affected.

AI-Powered Analysis

AILast updated: 08/20/2025, 00:39:17 UTC

Technical Analysis

CVE-2025-53696 is a critical vulnerability identified in the Johnson Controls, Inc iSTAR Ultra access control system firmware. The vulnerability is categorized under CWE-494, which involves the download of code without integrity verification. Specifically, while the iSTAR Ultra firmware performs a verification process during device boot, this verification does not cover certain portions of the firmware image. These unchecked portions can potentially harbor malicious code that remains undetected during the boot verification process. The vulnerability has been tested up to firmware version 6.9.2, with indications that later firmware versions may also be affected. The CVSS 4.0 base score of 9.3 reflects a critical severity, highlighting the high impact and exploitability of this flaw. The vector metrics indicate that exploitation requires local access (AV:L), low attack complexity (AC:L), no user interaction (UI:N), and high privileges (PR:H). The vulnerability impacts confidentiality, integrity, and availability at a high level, with a broad scope affecting the entire system. Although no known exploits are currently reported in the wild, the nature of the vulnerability allows an attacker with high privileges and local access to inject malicious code into the firmware, potentially leading to persistent compromise, unauthorized control over physical access systems, and disruption of security operations. Given that iSTAR Ultra is a widely deployed access control platform used in critical infrastructure, commercial buildings, and government facilities, this vulnerability poses a significant risk to the security posture of affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-53696 is substantial due to the critical role iSTAR Ultra devices play in physical security and access control. Successful exploitation could allow attackers to bypass security controls, manipulate access permissions, or disable security mechanisms, leading to unauthorized physical access to sensitive facilities. This could result in data breaches, theft of intellectual property, or sabotage of critical infrastructure. The integrity of the firmware being compromised also opens the door to persistent backdoors that are difficult to detect and remediate. Given the high privileges required for exploitation, insider threats or attackers who have already gained elevated access could leverage this vulnerability to escalate their control. The disruption or compromise of physical security systems can have cascading effects on operational continuity, regulatory compliance (e.g., GDPR for data protection), and overall organizational safety. Additionally, the lack of integrity checks on firmware components undermines trust in the device's security assurances, potentially affecting confidence in deployed security infrastructure across Europe.

Mitigation Recommendations

To mitigate the risks posed by CVE-2025-53696, European organizations should implement a multi-layered approach: 1) Immediately verify the firmware version of all iSTAR Ultra devices and consult Johnson Controls for any available patches or firmware updates addressing this vulnerability. 2) If patches are not yet available, restrict local access to devices to trusted personnel only, and enhance monitoring of privileged user activities to detect any anomalous behavior. 3) Employ network segmentation to isolate access control systems from general IT networks, limiting the attack surface and preventing lateral movement. 4) Implement strict physical security controls to prevent unauthorized local access to devices. 5) Use cryptographic verification tools where possible to manually validate firmware integrity before deployment. 6) Establish incident response plans specifically addressing potential firmware compromise scenarios, including forensic analysis and device replacement procedures. 7) Engage with Johnson Controls support channels for advisories and participate in information sharing with industry peers and national cybersecurity centers to stay informed about emerging exploit techniques or patches. These steps go beyond generic advice by focusing on controlling local access, enhancing monitoring, and preparing for incident response specific to firmware integrity compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Dragos
Date Reserved
2025-07-08T14:48:42.604Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68878d8aad5a09ad008474ba

Added to database: 7/28/2025, 2:47:38 PM

Last enriched: 8/20/2025, 12:39:17 AM

Last updated: 9/1/2025, 2:20:23 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats