CVE-2025-61738

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to capture the PowerG network key and read or write encrypted packets on PowerG wireless networks. It affects Johnson Controls PowerG wireless security and building automation systems that use vulnerable PowerG transceivers.

💻 Affected Systems

Products:
  • Johnson Controls PowerG wireless transceivers and compatible devices
Versions: Specific versions not publicly disclosed in advisory
Operating Systems: Embedded firmware on PowerG devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PowerG wireless protocol implementation; requires physical proximity to wireless signals

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PowerG wireless security systems allowing unauthorized access, disabling of alarms, manipulation of building controls, and physical security breaches.

🟠

Likely Case

Unauthorized access to secured areas, disabling of alarm systems, or manipulation of building automation controls.

🟢

If Mitigated

Limited impact if network segmentation, monitoring, and physical security controls prevent attacker access to wireless signals.

🌐 Internet-Facing: LOW (PowerG networks are typically isolated from internet-facing systems)
🏢 Internal Only: HIGH (Attackers with physical proximity to wireless signals can exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires specialized RF equipment and knowledge of PowerG protocol; physical proximity to wireless signals needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Johnson Controls for specific firmware updates

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Contact Johnson Controls for firmware updates
2. Schedule maintenance window for device updates
3. Update firmware on all affected PowerG devices
4. Verify successful update and functionality

🔧 Temporary Workarounds

Physical Security Enhancement

all

Restrict physical access to areas where PowerG wireless signals can be intercepted

Network Segmentation

all

Isolate PowerG networks from other critical systems

🧯 If You Can't Patch

  • Implement enhanced physical security controls around wireless devices
  • Deploy wireless intrusion detection systems to monitor for unauthorized PowerG activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Johnson Controls security advisory

Check Version:

Check device firmware through Johnson Controls system interface or device management tools

Verify Fix Applied:

Verify firmware version has been updated to patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized device pairings
  • Unexpected wireless communication patterns
  • Failed authentication attempts on PowerG network

Network Indicators:

  • Unusual PowerG protocol traffic patterns
  • RF signals indicating wireless interception attempts

SIEM Query:

Search for PowerG device authentication failures or unauthorized pairing events

🔗 References

📤 Share & Export