Johnson Controls Software House C●CURE 9000
Sensitive credentials used for access to the C•CURE 9000 building automation and access control system are stored in plaintext in the api.log log file. An attacker with local access to the C•CURE 9000 application server or engineering workstation can read this log file to extract valid Windows account credentials, potentially gaining unauthorized access to modify security policies, door lock assignments, alarm thresholds, or other critical building automation functions. The vulnerability affects version 3.00.2 and earlier.
- Local access to the C•CURE 9000 server or workstation
- File system read permissions to the victorWebServices Logs directory
- Ability to access or exfiltrate the api.log file
Patching may require device reboot — plan for process interruption
/api/v1/advisories/15034b51-ab34-4fcd-bfeb-5c0c3911e38fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.