CVE-2025-43875
π TL;DR
This CVE describes an OS command injection vulnerability (CWE-78) in Johnson Controls building automation systems. Successful exploitation could allow attackers to execute arbitrary commands on affected devices, potentially leading to unauthorized access. Organizations using Johnson Controls building management systems are affected.
π» Affected Systems
- Johnson Controls building automation systems
- Metasys building management systems
- Cβ’CURE access control systems
β οΈ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
π Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
β οΈ Risk & Real-World Impact
Worst Case
Complete compromise of building automation systems allowing attackers to manipulate physical controls (HVAC, access control, fire safety), exfiltrate sensitive data, or pivot to other network segments.
Likely Case
Unauthorized access to building management systems allowing attackers to disrupt operations, steal configuration data, or use compromised devices as footholds for further attacks.
If Mitigated
Limited impact with proper network segmentation, command input validation, and least privilege controls in place.
π― Exploit Status
Exploitation requires some knowledge of building automation systems but follows standard command injection patterns. Attackers need some level of access to vulnerable interfaces.
π οΈ Fix & Mitigation
β Official Fix
Patch Version: Refer to Johnson Controls security advisory for specific patched versions
Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories
Restart Required: Yes
Instructions:
1. Review Johnson Controls security advisory ICSA-25-345-01. 2. Identify affected products and versions. 3. Apply vendor-provided patches or firmware updates. 4. Restart affected systems. 5. Verify patch installation.
π§ Temporary Workarounds
Network segmentation
allIsolate building automation systems from general corporate networks and internet access
Input validation hardening
allImplement strict input validation on all command interfaces
π§― If You Can't Patch
- Implement strict network access controls to limit who can reach vulnerable interfaces
- Deploy web application firewalls with command injection detection rules
π How to Verify
Check if Vulnerable:
Check system version against Johnson Controls advisory and look for command injection vulnerabilities in web/API interfaces
Check Version:
System-specific - consult Johnson Controls documentation for version query commands
Verify Fix Applied:
Verify patch installation through version checks and test command injection attempts to confirm they're blocked
π‘ Detection & Monitoring
Log Indicators:
- Unusual command execution patterns
- Failed authentication attempts followed by command injection attempts
- System logs showing unexpected shell commands
Network Indicators:
- Traffic to building automation systems containing shell metacharacters
- Unusual outbound connections from building management systems
SIEM Query:
source="building_automation" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")