CVE-2024-32932

6.8 MEDIUM

📋 TL;DR

CVE-2024-32932 allows authenticated users to recover other users' credentials from the web interface under certain circumstances. This affects Johnson Controls Metasys products and could lead to unauthorized access to sensitive systems. The vulnerability requires authenticated access but enables credential harvesting.

💻 Affected Systems

Products:
  • Johnson Controls Metasys products
Versions: Specific versions not detailed in references; consult vendor advisory for exact affected versions
Operating Systems: Not specified, likely embedded systems running Metasys software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface components of Metasys products; requires authenticated user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could harvest administrator credentials, gain full system control, and potentially pivot to other critical infrastructure systems.

🟠

Likely Case

An authenticated user with malicious intent could steal credentials of other users, leading to unauthorized access to building management systems and potential operational disruption.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential exposure of users with similar or lower privileges than the attacker.

🌐 Internet-Facing: HIGH if web interface is exposed to internet, as authenticated attackers could harvest credentials remotely.
🏢 Internal Only: MEDIUM as it requires authenticated access but could still lead to privilege escalation within internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface; the vulnerability allows credential recovery through the interface itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Johnson Controls advisory for specific patched versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls advisory for affected versions. 2. Apply vendor-provided patches or updates. 3. Restart affected systems as required. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict web interface access

all

Limit access to the web interface to only trusted users and networks

Configure firewall rules to restrict access to web interface ports
Implement network segmentation for Metasys systems

Implement strong authentication controls

all

Enforce multi-factor authentication and strong password policies

Enable MFA for all web interface users
Implement account lockout policies after failed attempts

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit exposure
  • Monitor authentication logs for unusual credential access patterns

🔍 How to Verify

Check if Vulnerable:

Check system version against Johnson Controls advisory; review if web interface allows credential recovery by authenticated users

Check Version:

Consult Metasys documentation for version check commands specific to your deployment

Verify Fix Applied:

Verify patch installation through version check and test that authenticated users cannot recover other users' credentials

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple credential access attempts from single user
  • Access to credential-related API endpoints

Network Indicators:

  • Traffic to web interface endpoints associated with credential management
  • Unusual authentication request patterns

SIEM Query:

source="metasys_web_logs" AND (event_type="credential_access" OR uri="/api/credentials")

🔗 References

📤 Share & Export