Vulnerabilites related to Johnson Controls - Metasys
CVE-2021-36202 (GCVE-0-2021-36202)
Vulnerability from cvelistv5
Published
2022-04-07 19:12
Modified
2024-09-17 01:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Johnson Controls | Metasys |
Version: All 10 versions < 10.1.5 Version: All 11 versions < 11.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:54:50.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Metasys", "vendor": "Johnson Controls", "versions": [ { "lessThan": "10.1.5", "status": "affected", "version": "All 10 versions", "versionType": "custom" }, { "lessThan": "11.0.2", "status": "affected", "version": "All 11 versions", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Tony West" } ], "datePublic": "2022-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-07T19:13:04", "orgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "shortName": "jci" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-02" } ], "solutions": [ { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5." }, { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 11 versions with patch 11.0.2." } ], "source": { "discovery": "EXTERNAL" }, "title": "Metasys UI", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productsecurity@jci.com", "DATE_PUBLIC": "2022-04-07T13:07:00.000Z", "ID": "CVE-2021-36202", "STATE": "PUBLIC", "TITLE": "Metasys UI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metasys", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All 10 versions", "version_value": "10.1.5" }, { "version_affected": "\u003c", "version_name": "All 11 versions", "version_value": "11.0.2" } ] } } ] }, "vendor_name": "Johnson Controls" } ] } }, "credit": [ { "lang": "eng", "value": "Tony West" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories", "refsource": "CONFIRM", "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "refsource": "CERT", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-02" } ] }, "solution": [ { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5." }, { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 11 versions with patch 11.0.2." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "assignerShortName": "jci", "cveId": "CVE-2021-36202", "datePublished": "2022-04-07T19:12:48.421855Z", "dateReserved": "2021-07-06T00:00:00", "dateUpdated": "2024-09-17T01:50:52.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-36205 (GCVE-0-2021-36205)
Vulnerability from cvelistv5
Published
2022-04-15 16:24
Modified
2024-09-16 23:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-459 - Incomplete Cleanup
Summary
Under certain circumstances the session token is not cleared on logout.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Johnson Controls | Metasys |
Version: All 10 versions < 10.1.5 Version: All 11 versions < 11.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:54:50.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Metasys", "vendor": "Johnson Controls", "versions": [ { "lessThan": "10.1.5", "status": "affected", "version": "All 10 versions", "versionType": "custom" }, { "lessThan": "11.0.2", "status": "affected", "version": "All 11 versions", "versionType": "custom" } ] } ], "datePublic": "2022-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Under certain circumstances the session token is not cleared on logout." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459: Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T16:24:48", "orgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "shortName": "jci" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-02" } ], "solutions": [ { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5" }, { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 11 versions with patch 11.0.2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Metasys session token", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productsecurity@jci.com", "DATE_PUBLIC": "2022-04-14T20:43:00.000Z", "ID": "CVE-2021-36205", "STATE": "PUBLIC", "TITLE": "Metasys session token" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metasys", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "All 10 versions", "version_value": "10.1.5" }, { "version_affected": "\u003c", "version_name": "All 11 versions", "version_value": "11.0.2" } ] } } ] }, "vendor_name": "Johnson Controls" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Under certain circumstances the session token is not cleared on logout." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-459: Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories", "refsource": "CONFIRM", "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "refsource": "CERT", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-02" } ] }, "solution": [ { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5" }, { "lang": "en", "value": "Update all Metasys ADS/ADX/OAS 11 versions with patch 11.0.2" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "assignerShortName": "jci", "cveId": "CVE-2021-36205", "datePublished": "2022-04-15T16:24:48.570137Z", "dateReserved": "2021-07-06T00:00:00", "dateUpdated": "2024-09-16T23:41:01.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-27657 (GCVE-0-2021-27657)
Vulnerability from cvelistv5
Published
2021-06-04 14:07
Modified
2024-09-17 00:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server file system, allowing them to access or modify system files by sending specifically crafted web messages to the Metasys system. This issue affects: Johnson Controls Metasys version 11.0 and prior versions.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Johnson Controls | Metasys |
Version: 11.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:10.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "https://us-cert.gov/ics/advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Metasys", "vendor": "Johnson Controls", "versions": [ { "lessThanOrEqual": "11.0", "status": "affected", "version": "11.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Jakub Palaczynski" } ], "datePublic": "2021-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server file system, allowing them to access or modify system files by sending specifically crafted web messages to the Metasys system. This issue affects: Johnson Controls Metasys version 11.0 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-23T10:45:14", "orgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "shortName": "jci" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "https://us-cert.gov/ics/advisories" }, { "name": "ICS-CERT Advisory", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-01" } ], "solutions": [ { "lang": "en", "value": "For Metasys versions previous to 9.0: Upgrade to a supported release. This is true for all the items except for Metasys Release 8.1 UL/cUL 864 UUKL 10th Edition Smoke Control." }, { "lang": "en", "value": "For Metasys versions 9.0 (engine only), 10.0, 10.1, 11.0: Install patch." } ], "source": { "discovery": "EXTERNAL" }, "title": "Metasys Improper Privilege Management", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productsecurity@jci.com", "DATE_PUBLIC": "2021-06-04T05:01:00.000Z", "ID": "CVE-2021-27657", "STATE": "PUBLIC", "TITLE": "Metasys Improper Privilege Management" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metasys", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "11.0", "version_value": "11.0" } ] } } ] }, "vendor_name": "Johnson Controls" } ] } }, "credit": [ { "lang": "eng", "value": "Jakub Palaczynski" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server file system, allowing them to access or modify system files by sending specifically crafted web messages to the Metasys system. This issue affects: Johnson Controls Metasys version 11.0 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories", "refsource": "CONFIRM", "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories" }, { "name": "ICS-CERT Advisory", "refsource": "CERT", "url": "https://us-cert.gov/ics/advisories" }, { "name": "ICS-CERT Advisory", "refsource": "CERT", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-01" } ] }, "solution": [ { "lang": "en", "value": "For Metasys versions previous to 9.0: Upgrade to a supported release. This is true for all the items except for Metasys Release 8.1 UL/cUL 864 UUKL 10th Edition Smoke Control." }, { "lang": "en", "value": "For Metasys versions 9.0 (engine only), 10.0, 10.1, 11.0: Install patch." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "7281d04a-a537-43df-bfb4-fa4110af9d01", "assignerShortName": "jci", "cveId": "CVE-2021-27657", "datePublished": "2021-06-04T14:07:39.073279Z", "dateReserved": "2021-02-24T00:00:00", "dateUpdated": "2024-09-17T00:51:44.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }