CVE-2025-61739

N/A Unknown

📋 TL;DR

This vulnerability involves nonce reuse in Johnson Controls Metasys products, allowing attackers to perform replay attacks or decrypt captured network packets. It affects building automation systems that use vulnerable versions of Metasys software and devices. Organizations using these systems for HVAC, security, or other building controls are at risk.

💻 Affected Systems

Products:
  • Johnson Controls Metasys products
Versions: Specific versions not detailed in available references; consult vendor advisory for exact affected versions
Operating Systems: Embedded systems in Metasys devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Metasys building automation systems used for HVAC, lighting, security, and other building controls. Exact product list requires vendor consultation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized control of building systems, manipulate environmental controls, disable security systems, or access sensitive building data through decrypted communications.

🟠

Likely Case

Attackers intercept and replay legitimate commands to manipulate building systems, potentially causing operational disruptions or unauthorized access to controlled areas.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated building systems with minimal safety or security consequences.

🌐 Internet-Facing: MEDIUM - Systems exposed to internet are vulnerable to remote attacks, but exploitation requires network access and protocol knowledge.
🏢 Internal Only: HIGH - Internal attackers or compromised devices can exploit this to manipulate critical building systems with significant operational impact.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to Metasys systems and understanding of the protocol. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Johnson Controls advisory for specific patched versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls security advisory ICSA-25-350-02
2. Identify affected Metasys products in your environment
3. Apply vendor-provided patches or firmware updates
4. Restart affected systems as required
5. Verify patch implementation through testing

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Metasys systems from general corporate networks and internet access

Network Monitoring

all

Implement network monitoring for unusual Metasys protocol traffic patterns

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with Metasys systems
  • Deploy network intrusion detection systems to monitor for replay attack patterns

🔍 How to Verify

Check if Vulnerable:

Check system versions against Johnson Controls advisory and verify if Metasys products are in use

Check Version:

Consult Metasys system documentation for version checking procedures specific to your deployment

Verify Fix Applied:

Verify patch installation through version checks and test system functionality post-update

📡 Detection & Monitoring

Log Indicators:

  • Repeated identical commands in short timeframes
  • Unexpected system state changes
  • Authentication anomalies in building control logs

Network Indicators:

  • Duplicate network packets with identical nonces
  • Unusual timing patterns in Metasys protocol traffic
  • Traffic from unexpected sources to building control systems

SIEM Query:

Search for repeated identical commands to Metasys systems within short time windows or from multiple source IPs

🔗 References

📤 Share & Export