OTPulse

Johnson Controls Facility Explorer

Act Now6.6ICS-CERT ICSA-19-022-01Jan 22, 2019
Attack VectorNetwork
Auth RequiredHigh
ComplexityHigh
User InteractionNone needed
Summary

Facility Explorer contains path traversal vulnerabilities that allow an attacker with administrative credentials to read, write, and delete arbitrary files on the system. Successful exploitation could grant full administrator privileges and compromise the integrity of the building automation system.

What this means
What could happen
An attacker with administrative access could modify building automation configurations, alter HVAC setpoints, disable safety interlocks, or shut down facility systems. Loss of building automation could affect climate control, emergency systems, and operational continuity.
Who's at risk
Building automation and facility management staff who operate Johnson Controls Facility Explorer systems. This affects facilities with centralized HVAC, lighting, and security control systems, including hospitals, office buildings, data centers, and municipal buildings.
How it could be exploited
An attacker with valid administrator credentials on the Facility Explorer system can exploit path traversal to access the file system, read sensitive files, write malicious configuration files, or delete critical system files to escalate privileges and take control of the building automation platform.
Prerequisites
  • <parameter name="prerequisites"> <parameter name="text">Valid administrator credentials for Facility Explorer
<parameter name="text">high complexity barrier may delay widespread exploitation
Exploitability
High exploit probability (EPSS 19.6%)
Affected products (2)
2 pending
ProductAffected VersionsFix Status
Facility Explorer:< 6.6 (6.x series)No fix yet
Facility Explorer:< 14.4u1 (14.x series)No fix yet
Remediation & Mitigation

Johnson Controls has mitigated these vulnerabilities in the following versions. Users should upgrade to one of these product versions (FX14.6 recommended): Facility Explorer 14.6 (released September 2018) Facility Explorer 14.4u1 (released August 2018) Facility Explorer 6.6 (released August 2018) For more information, please refer to Johnson Controls Global Product Security at https://www.johnsoncontrols.com/buildings/specialty-pages/product-security or send an email to productsecurity@jci.comJohnson Controls Services and Support:  https://www.johnsoncontrols.com/buildings/hvac-controls NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls, and isolate them from the business network. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents. No known public exploits specifically target these vulnerabilities. High skill level is needed to exploit.

↑↓ Navigate · Esc Close
API: /api/v1/advisories/7b7a74c7-3344-462b-82c5-fdde3b4daa2d
Johnson Controls Facility Explorer | CVSS 6.6 - OTPulse