Skip to main content

CVE-2025-53696: CWE-494 Download of Code Without Integrity Check in Johnson Controls, Inc iSTAR Ultra

Critical
VulnerabilityCVE-2025-53696cvecve-2025-53696cwe-494
Published: Mon Jul 28 2025 (07/28/2025, 14:43:01 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls, Inc
Product: iSTAR Ultra

Description

iSTAR Ultra performs a firmware verification on boot, however the verification does not inspect certain portions of the firmware. These firmware parts may contain malicious code. Tested up to firmware 6.9.2, later firmwares are also possibly affected.

AI-Powered Analysis

AILast updated: 07/28/2025, 15:02:42 UTC

Technical Analysis

CVE-2025-53696 is a critical vulnerability identified in the Johnson Controls, Inc iSTAR Ultra access control system firmware. The core issue stems from the device's firmware verification process during boot-up, which fails to inspect certain portions of the firmware image. This incomplete verification allows malicious code to reside undetected within these unchecked firmware segments. The vulnerability is categorized under CWE-494, which refers to the download of code without integrity checks, indicating that the system does not adequately validate the authenticity or integrity of all firmware components before execution. The affected firmware versions include those up to 6.9.2, with potential impact on later versions as well. The CVSS 4.0 base score of 9.3 reflects a critical severity level, highlighting the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity but requiring high privileges for exploitation. The vector metrics indicate that the attack requires local access (AV:L) and high privileges (PR:H), but no user interaction (UI:N) is needed. The vulnerability could allow an attacker with elevated privileges on the device to inject malicious code into the unchecked firmware sections, potentially leading to full compromise of the device's functionality, unauthorized access control manipulation, or persistent backdoors within physical security infrastructure. Although no known exploits are currently reported in the wild, the critical nature of the flaw and the strategic role of iSTAR Ultra in physical security systems make this a significant threat. Johnson Controls has not yet published patches, increasing the urgency for organizations to implement compensating controls and monitor for suspicious activity related to firmware integrity.

Potential Impact

For European organizations, the impact of this vulnerability is substantial, especially for those relying on Johnson Controls iSTAR Ultra systems to secure physical premises such as corporate offices, government buildings, critical infrastructure, and data centers. Exploitation could lead to unauthorized physical access, allowing attackers to bypass security controls, manipulate access logs, or disable alarms. This undermines both physical security and potentially the cybersecurity posture if attackers gain entry to networked environments. The integrity of the firmware is crucial for maintaining trust in the device's operation; malicious firmware could also be used to establish persistent footholds or pivot to other networked systems. Given the criticality of the vulnerability and the lack of patches, European entities face increased risk of targeted attacks, especially those in sectors with high security requirements such as finance, energy, transportation, and government. The requirement for local high-privilege access limits remote exploitation but does not eliminate risk, as insider threats or attackers who have already compromised internal networks could leverage this vulnerability to escalate control over physical security systems.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting and monitoring access to iSTAR Ultra devices to trusted personnel only, enforcing strict privilege management to prevent unauthorized elevation to high privileges. 2. Implement network segmentation to isolate physical security devices from general IT networks, reducing the risk of lateral movement by attackers. 3. Employ continuous monitoring and logging of device firmware integrity and access control events to detect anomalies indicative of tampering. 4. Coordinate with Johnson Controls for timely updates and patches; once available, prioritize firmware upgrades to versions that address this vulnerability. 5. Consider deploying additional physical security layers (e.g., biometric verification, security guards) to compensate for potential firmware compromise. 6. Conduct regular security audits and penetration tests focusing on physical security systems to identify and remediate weaknesses. 7. Develop incident response plans specifically addressing scenarios involving physical security system compromise to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Dragos
Date Reserved
2025-07-08T14:48:42.604Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68878d8aad5a09ad008474ba

Added to database: 7/28/2025, 2:47:38 PM

Last enriched: 7/28/2025, 3:02:42 PM

Last updated: 7/28/2025, 3:02:42 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats