Johnson Controls Metasys
Johnson Controls Metasys system versions prior to 9.0 contain cryptographic weaknesses (improper use of cryptographic keys and inadequate cryptographic key restrictions) that allow an attacker who captures network traffic to decrypt sensitive communications. The vulnerabilities stem from weak or hardcoded encryption keys used to protect communication between Metasys components. No known public exploits exist, and exploitation requires high technical skill and the ability to capture and analyze network traffic. The advisory does not indicate these vulnerabilities are actively exploited in the wild.
- Network access to capture Metasys traffic (man-in-the-middle position or network tap)
- Sufficient time and resources to perform cryptanalysis on captured packets
- Metasys version prior to 9.0
- System not using trusted certificates for encryption
Patching may require device reboot — plan for process interruption
/api/v1/advisories/82835da7-6346-4f27-ad8c-fdf6ab1ba154Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.