CVE-2025-26385

N/A Unknown

📋 TL;DR

This CVE describes a command injection vulnerability in Johnson Controls Metasys components that allows remote SQL execution. Attackers can inject malicious commands through improperly neutralized special elements. Affected systems include Metasys ADS/ADX servers, LCS8500/NAE8500 controllers, and configuration tools running SQL Express.

💻 Affected Systems

Products:
  • Metasys Application and Data Server (ADS)
  • Extended Application and Data Server (ADX)
  • LCS8500
  • NAE8500
  • System Configuration Tool (SCT)
  • Controller Configuration Tool (CCT)
Versions: Metasys 12.0 through 14.1, SCT 17.1 and prior, CCT 17.0 and prior
Operating Systems: Windows (SQL Express deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using SQL Express database deployments. Other database configurations may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote attackers to execute arbitrary SQL commands, potentially leading to data theft, system manipulation, or lateral movement within the network.

🟠

Likely Case

Unauthorized database access leading to data exfiltration, system configuration changes, or denial of service through SQL command manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation, input validation, and least privilege SQL accounts are implemented.

🌐 Internet-Facing: HIGH - If vulnerable components are exposed to the internet, attackers can remotely exploit without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access but could be exploited by malicious insiders or through lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity. The advisory suggests remote exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Johnson Controls advisory for specific patched versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls advisory for specific patch versions
2. Apply patches according to vendor instructions
3. Restart affected services/components
4. Verify patch application and functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks and internet exposure

Input Validation Enhancement

all

Implement additional input validation and sanitization for SQL command parameters

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IPs only
  • Monitor SQL query logs for unusual patterns or injection attempts

🔍 How to Verify

Check if Vulnerable:

Check installed versions against affected version ranges and verify SQL Express deployment

Check Version:

Check application version through Metasys/SCT/CCT administration interfaces

Verify Fix Applied:

Verify patch installation through version checks and test SQL command functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns
  • Multiple failed SQL command attempts
  • Unexpected database schema changes

Network Indicators:

  • Unusual SQL traffic patterns to affected systems
  • SQL injection payloads in network traffic

SIEM Query:

source="metasys_logs" AND (sql_command="*;*" OR sql_command="*|*" OR sql_command="*&*" OR sql_command="*`*")

🔗 References

📤 Share & Export