CVE-2021-36207

8.8 HIGH

📋 TL;DR

CVE-2021-36207 is a privilege escalation vulnerability in Johnson Controls Metasys ADS/ADX/OAS servers that allows authenticated users to elevate their privileges to administrator level. This affects building automation systems running Metasys versions 10 and 11. The vulnerability stems from improper privilege management under certain circumstances.

💻 Affected Systems

Products:
  • Metasys ADS Server
  • Metasys ADX Server
  • Metasys OAS Server
Versions: 10.x and 11.x
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects both internet-facing and internal systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with authenticated access could gain full administrative control over building automation systems, potentially manipulating HVAC, lighting, security systems, and accessing sensitive operational data.

🟠

Likely Case

Malicious insiders or compromised accounts could escalate privileges to modify system configurations, disrupt building operations, or establish persistence for further attacks.

🟢

If Mitigated

With proper network segmentation, strong authentication, and monitoring, impact would be limited to isolated systems with quick detection and response.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.0.2 and later

Vendor Advisory: https://www.johnsoncontrols.com/cyber-solutions/security-advisories

Restart Required: Yes

Instructions:

1. Download patch from Johnson Controls support portal. 2. Backup system configuration. 3. Apply patch following vendor instructions. 4. Restart affected servers. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Metasys servers from general network access and restrict to necessary connections only.

Access Control Enhancement

all

Implement strict role-based access control and monitor for privilege escalation attempts.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Metasys servers from untrusted networks
  • Enhance monitoring for privilege escalation attempts and unusual administrative activity

🔍 How to Verify

Check if Vulnerable:

Check Metasys server version in system administration interface or via vendor-provided tools.

Check Version:

Check via Metasys System Configuration Tool or vendor documentation.

Verify Fix Applied:

Verify version is 11.0.2 or later and test privilege escalation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege changes
  • Multiple failed then successful authentication attempts
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual authentication traffic patterns
  • Administrative protocol usage from unexpected sources

SIEM Query:

source="metasys" AND (event_type="privilege_change" OR user_role="admin" AND user_group!="administrators")

🔗 References

📤 Share & Export