Johnson Controls Sensormatic Electronics American Dynamics victor Web Client
American Dynamics victor Web Client and Software House C•CURE Web Client contain an authentication bypass vulnerability. An unauthenticated attacker on the network can create and sign a forged JSON web token (JWT) and use it to execute HTTP API commands without valid credentials. This could be exploited to conduct denial-of-service attacks or impact system availability. The vulnerability affects victor Web Client and C•CURE Web Client versions below 2.90. C•CURE 9000 v2.90 and later (new web-based client introduced in v2.90) are not affected.
- Network access to the American Dynamics victor Web Client or C•CURE Web Client HTTP API port
- No valid credentials required
- Attacker must be on the same network segment (AV:A in CVSS indicates Adjacent Network access)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2ecce92b-f50d-4625-804e-16f5f079bd45Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.