CVE-2025-26379

N/A Unknown

📋 TL;DR

This vulnerability involves the use of a weak pseudo-random number generator in PowerG systems, which could allow attackers to decrypt or inject encrypted PowerG packets. This affects Johnson Controls PowerG wireless security systems and potentially other systems using similar encryption implementations. Organizations using vulnerable PowerG devices for physical security are at risk.

💻 Affected Systems

Products:
  • Johnson Controls PowerG wireless security systems
  • Third-party systems using PowerG protocol
Versions: All versions prior to firmware updates addressing CWE-338
Operating Systems: Embedded firmware on PowerG devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PowerG wireless protocol implementation; specific product models should be verified with vendor documentation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt all PowerG wireless communications, inject false alarm or disarm signals, bypass physical security systems, and gain unauthorized access to secured areas.

🟠

Likely Case

Skilled attackers could intercept and decrypt PowerG communications to monitor security system activity or potentially inject limited false signals.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to potential information disclosure about security system activity.

🌐 Internet-Facing: LOW (PowerG systems typically operate on isolated wireless networks, not directly internet-facing)
🏢 Internal Only: HIGH (Attackers with physical proximity to wireless signals could exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity to wireless signals and cryptographic analysis capabilities; no public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls security advisory ICSA-25-350-02. 2. Identify affected PowerG devices. 3. Download updated firmware from Johnson Controls support portal. 4. Apply firmware updates following vendor instructions. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PowerG systems from other networks to limit attack surface

Physical Security Controls

all

Restrict physical access to areas where PowerG signals can be intercepted

🧯 If You Can't Patch

  • Implement additional physical security layers (guards, barriers, surveillance)
  • Deploy wireless intrusion detection systems to monitor for suspicious PowerG activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory; devices using PowerG protocol with firmware prior to security updates are vulnerable

Check Version:

Varies by device - typically through device management interface or console; consult vendor documentation

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Firmware version changes
  • Authentication failures on PowerG devices

Network Indicators:

  • Unusual PowerG wireless traffic patterns
  • Suspicious RF signals in PowerG frequency range

SIEM Query:

Search for: (event_category:"firmware_update" OR event_category:"device_restart") AND device_type:"PowerG"

🔗 References

📤 Share & Export