The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated
communications with ICU, which may allow an attacker to gain unauthorized access
Metrics
Affected Vendors & Products
References
History
Thu, 24 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Johnsoncontrols
Johnsoncontrols icu Johnsoncontrols software House Istar Pro Door Controller |
|
CPEs | cpe:2.3:h:johnsoncontrols:icu:*:*:*:*:*:*:*:* cpe:2.3:h:johnsoncontrols:software_house_istar_pro_door_controller:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Johnsoncontrols
Johnsoncontrols icu Johnsoncontrols software House Istar Pro Door Controller |
|
Metrics |
ssvc
|
Thu, 24 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Under certain circumstances communications between the ICU tool and an iSTAR Pro door controller is susceptible to Machine-in-the-Middle attacks which could impact door control and configuration. | The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access |
Title | Johnson Controls Software House iStar Pro Door Controller | Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool |
References |
|

Status: PUBLISHED
Assigner: jci
Published: 2024-06-06T20:49:53.476Z
Updated: 2025-04-24T20:05:35.350Z
Reserved: 2024-04-17T17:26:35.180Z
Link: CVE-2024-32752

Updated: 2024-08-02T02:20:35.187Z

Status : Awaiting Analysis
Published: 2024-06-06T21:15:48.523
Modified: 2025-04-24T20:15:31.463
Link: CVE-2024-32752

No data.