CVE-2025-43873

N/A Unknown

📋 TL;DR

This CVE describes an OS command injection vulnerability (CWE-78) in Johnson Controls Metasys products that allows attackers to execute arbitrary commands on affected devices. Successful exploitation could enable firmware modification and full device compromise. This affects Johnson Controls Metasys building automation systems used in critical infrastructure.

💻 Affected Systems

Products:
  • Johnson Controls Metasys
Versions: Multiple versions prior to 13.2.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Metasys application and extension applications (AX) servers. Requires network access to vulnerable endpoints.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control over building automation systems, potentially enabling physical access manipulation, environmental system disruption, or lateral movement to other critical systems.

🟠

Likely Case

Attackers exploit the vulnerability to install backdoors, steal sensitive building data, or disrupt HVAC and access control systems in targeted facilities.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated building automation networks with minimal effect on core business operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to vulnerable endpoints. CISA advisory indicates active exploitation may be occurring.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Metasys 13.2.2 and later

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Download Metasys 13.2.2 or later from Johnson Controls support portal. 2. Backup current configuration. 3. Apply update following vendor documentation. 4. Restart affected services/systems. 5. Verify update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Metasys systems from untrusted networks and implement strict firewall rules

Access Control Hardening

all

Implement least privilege access controls and multi-factor authentication for Metasys administrative interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Metasys systems from internet and untrusted networks
  • Deploy application-level firewalls and monitor for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check Metasys version via administrative interface or system properties. Versions prior to 13.2.2 are vulnerable.

Check Version:

Check via Metasys System Configuration application or review installed program version in Windows/Linux

Verify Fix Applied:

Verify system is running Metasys 13.2.2 or later through administrative interface version check.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in Metasys logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected system configuration changes

Network Indicators:

  • Unusual outbound connections from Metasys systems
  • Traffic to known malicious IPs from building automation network
  • Anomalous protocol usage on Metasys ports

SIEM Query:

source="metasys" AND (event_type="command_execution" OR event_type="system_modification")

🔗 References

📤 Share & Export