CVE-2024-32755

9.1 CRITICAL

📋 TL;DR

CVE-2024-32755 is an input validation vulnerability in Johnson Controls Metasys web interface that allows attackers to submit unexpected characters, potentially leading to system compromise. This affects industrial control systems using vulnerable Metasys versions. Organizations with exposed Metasys interfaces are at risk.

💻 Affected Systems

Products:
  • Johnson Controls Metasys
Versions: Specific versions not detailed in references; consult vendor advisory for exact affected versions.
Operating Systems: Windows-based systems running Metasys
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface component of Metasys building management system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, manipulation of building automation systems, and physical safety risks.

🟠

Likely Case

Unauthorized access to building control systems, data exfiltration, and disruption of HVAC/security operations.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation controls in place.

🌐 Internet-Facing: HIGH - Web interface vulnerability that could be exploited remotely if exposed to internet.
🏢 Internal Only: MEDIUM - Still exploitable via internal network but requires initial access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Input validation flaws typically have low exploitation complexity once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Johnson Controls advisory for specific patched versions.

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls advisory 2. Download appropriate patch 3. Apply patch following vendor instructions 4. Restart affected services 5. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Metasys systems from untrusted networks and internet.

Web Application Firewall

all

Deploy WAF with input validation rules to block malicious requests.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor web interface logs for unusual input patterns

🔍 How to Verify

Check if Vulnerable:

Check Metasys version against Johnson Controls advisory; test web interface with input validation testing tools.

Check Version:

Check Metasys application version through administrative interface or system documentation.

Verify Fix Applied:

Verify patch version installed and test web interface with previously vulnerable inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to web interface
  • Input containing unexpected characters or patterns

Network Indicators:

  • Anomalous traffic to Metasys web ports
  • Requests bypassing normal input validation

SIEM Query:

source="metasys_web_logs" AND (http_request CONTAINS "unexpected_characters" OR status_code=400)

🔗 References

📤 Share & Export