The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access
History

Thu, 24 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols icu
Johnsoncontrols software House Istar Pro Door Controller
CPEs cpe:2.3:h:johnsoncontrols:icu:*:*:*:*:*:*:*:*
cpe:2.3:h:johnsoncontrols:software_house_istar_pro_door_controller:*:*:*:*:*:*:*:*
Vendors & Products Johnsoncontrols
Johnsoncontrols icu
Johnsoncontrols software House Istar Pro Door Controller
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Description Under certain circumstances communications between the ICU tool and an iSTAR Pro door controller is susceptible to Machine-in-the-Middle attacks which could impact door control and configuration. The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access
Title Johnson Controls Software House iStar Pro Door Controller Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published: 2024-06-06T20:49:53.476Z

Updated: 2025-04-24T20:05:35.350Z

Reserved: 2024-04-17T17:26:35.180Z

Link: CVE-2024-32752

cve-icon Vulnrichment

Updated: 2024-08-02T02:20:35.187Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-06T21:15:48.523

Modified: 2025-04-24T20:15:31.463

Link: CVE-2024-32752

cve-icon Redhat

No data.