Johnson Controls Metasys
A vulnerability in Johnson Controls Metasys allows authenticated users to bypass file system access controls by sending specially crafted web messages. An attacker with valid Metasys credentials can read or modify system files that should be restricted, potentially affecting building automation functions. The vulnerability affects all versions of Metasys. Johnson Controls recommends users upgrade to version 9.0 or later, and users on versions 9.0 (engine), 10.0, 10.1, or 11.0 should install the available security patch. No public exploits are currently known.
- Valid Metasys user account credentials
- Network access to the Metasys web interface (typically port 80/443)
- Knowledge of crafted message format to trigger the vulnerability
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6d27e556-1545-4767-b089-8ec2bbf762d8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.