Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61738: CWE-319 Cleartext Transmission of Sensitive Information in Johnson Controls IQPanel2, IQHub,IQPanel2+,IQPanel 4,PowerG

0
Low
VulnerabilityCVE-2025-61738cvecve-2025-61738cwe-319
Published: Mon Dec 22 2025 (12/22/2025, 10:07:19 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: IQPanel2, IQHub,IQPanel2+,IQPanel 4,PowerG

Description

Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.

AI-Powered Analysis

AILast updated: 12/22/2025, 10:37:06 UTC

Technical Analysis

CVE-2025-61738 is a security vulnerability classified under CWE-319, which concerns the cleartext transmission of sensitive information. This vulnerability affects several Johnson Controls products, including IQPanel2, IQHub, IQPanel2+, IQPanel 4, and the PowerG wireless protocol used within these systems. Under specific conditions, an attacker with network access can intercept communications and capture the network key transmitted in cleartext. Possession of this key enables the attacker to decrypt, read, or even inject encrypted packets on the PowerG network, potentially compromising the confidentiality and integrity of the wireless communication. The vulnerability does not require any privileges or authentication but does require user interaction, and the attack complexity is high, which limits the ease of exploitation. The CVSS 4.0 base score is 2.3, indicating a low severity primarily due to the difficulty of exploitation and limited scope. No known exploits have been reported in the wild, and no patches have been published yet. The vulnerability arises from insecure transmission practices within the affected devices' network communication stack, exposing sensitive cryptographic material. This could lead to unauthorized access or manipulation of security system communications, undermining the trustworthiness of the affected control panels and their wireless networks.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential compromise of confidentiality within security and automation systems using Johnson Controls' PowerG wireless protocol. Attackers who capture the network key could eavesdrop on sensitive communications or inject malicious commands, potentially disrupting security monitoring or control functions. This could lead to unauthorized disarming of alarms, false alarms, or manipulation of building automation systems. While the vulnerability does not directly affect system availability or require elevated privileges, the breach of confidentiality could undermine trust in physical security infrastructure. Sectors such as critical infrastructure, government facilities, commercial real estate, and smart buildings that rely on these products are at higher risk. The low CVSS score suggests limited immediate risk, but the potential for targeted attacks in high-value environments remains. The absence of patches means organizations must rely on compensating controls until vendor fixes are available.

Mitigation Recommendations

Organizations should implement network segmentation to isolate Johnson Controls devices from untrusted or public networks, reducing the risk of interception. Employ strong physical security controls to prevent attackers from gaining local network access. Monitor network traffic for unusual patterns or unauthorized devices attempting to communicate with PowerG networks. Disable or limit wireless communication features where feasible, or switch to wired alternatives if possible. Engage with Johnson Controls to obtain timelines for patches or firmware updates addressing this vulnerability and apply them promptly once available. Educate users on the risks of interacting with these devices in insecure environments to minimize user interaction exploitation. Consider deploying additional encryption or VPN tunnels around vulnerable devices to protect transmitted data. Regularly audit and update security policies related to building automation and security systems to incorporate awareness of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-09-30T15:51:17.096Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69491bd19679ab05af567f7d

Added to database: 12/22/2025, 10:22:09 AM

Last enriched: 12/22/2025, 10:37:06 AM

Last updated: 12/22/2025, 12:30:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats