Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61740: CWE-346 Origin Validation Error in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG

0
High
VulnerabilityCVE-2025-61740cvecve-2025-61740cwe-346
Published: Mon Dec 22 2025 (12/22/2025, 14:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: IQ Panels2, 2+, IQHub, IQPanel 4, PowerG

Description

Authentication issue that does not verify the source of a packet which could allow an attacker to create a denial-of-service condition or modify the configuration of the device.

AI-Powered Analysis

AILast updated: 12/22/2025, 14:58:49 UTC

Technical Analysis

CVE-2025-61740 is a vulnerability categorized under CWE-346 (Origin Validation Error) affecting multiple Johnson Controls products including IQ Panels2, IQ Panels2+, IQHub, IQPanel 4, and PowerG. The core issue is an authentication flaw where the affected devices do not properly verify the origin of received packets. This lack of source validation means that an attacker on an adjacent network or with access to the same network segment can send crafted packets to the device, which the device will accept as legitimate. Exploiting this flaw, an attacker can either cause a denial-of-service (DoS) condition by disrupting normal device operation or modify the device’s configuration settings without any authentication or user interaction. The vulnerability has a CVSS 4.0 score of 7.2, reflecting a high severity due to the combination of low attack complexity, no required privileges or user interaction, and significant impact on integrity and availability. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or within radio range if wireless. The vulnerability affects critical building security and automation systems, which are often integrated into physical security and facility management infrastructures. No patches or known exploits are currently available, but the risk remains significant given the potential for disruption or unauthorized control of security devices. The vulnerability’s presence in widely deployed building management panels makes it a concern for organizations relying on Johnson Controls products for physical security and automation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and availability of building security and automation systems. Successful exploitation could lead to unauthorized modification of security panel configurations, potentially disabling alarms, altering access controls, or disrupting monitoring functions. This could facilitate physical security breaches or operational disruptions. The denial-of-service potential could cause outages in critical building management systems, impacting safety and operational continuity. Organizations in sectors such as commercial real estate, critical infrastructure, healthcare, and government facilities are particularly vulnerable due to their reliance on these systems for security and operational control. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in environments where network segmentation or monitoring is insufficient. The impact extends beyond individual facilities to potentially affect multi-site operations and integrated security environments common in European enterprises.

Mitigation Recommendations

1. Network Segmentation: Isolate Johnson Controls IQ Panels and related devices on dedicated VLANs or network segments with strict access controls to limit exposure to untrusted networks. 2. Access Control Lists (ACLs): Implement ACLs on network devices to restrict traffic to and from the affected panels only to trusted management systems and authorized personnel. 3. Monitoring and Logging: Deploy network monitoring solutions to detect anomalous packets or traffic patterns targeting these devices, enabling early detection of exploitation attempts. 4. Vendor Coordination: Maintain close communication with Johnson Controls for timely receipt and deployment of security patches or firmware updates addressing this vulnerability. 5. Physical Security: Ensure physical access to affected devices is controlled to prevent local exploitation or tampering. 6. Incident Response Preparedness: Develop and test incident response plans specific to potential disruptions or compromises of building management systems. 7. Wireless Security: For PowerG wireless devices, ensure robust wireless encryption and authentication mechanisms are in place to reduce risk from wireless attack vectors. 8. Configuration Auditing: Regularly audit device configurations for unauthorized changes and enforce configuration management policies. These measures go beyond generic advice by focusing on network architecture, monitoring, and operational readiness tailored to the affected products and their deployment contexts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2025-09-30T15:51:17.096Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694959ea89a9ac879c469573

Added to database: 12/22/2025, 2:47:06 PM

Last enriched: 12/22/2025, 2:58:49 PM

Last updated: 12/22/2025, 4:22:32 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats