Johnson Controls Software House iStar Door Controller (Update A)
A critical authentication bypass vulnerability (CWE-306) exists in Johnson Controls Software House iStar door controllers that allows attackers to gain unauthorized access without valid credentials. The iStar Pro, Edge, and eX controllers in all versions are vulnerable with no patch planned. The iStar Ultra and Ultra LT controllers are vulnerable in firmware versions prior to 6.6.B. The iSTAR Configuration Utility (ICU) tool can be weaponized to push configuration changes to vulnerable controllers, potentially allowing attackers to alter access control settings, disable alarms, or modify user permissions.
- Network reachability to the iStar door controller
- iStar Pro, Edge, or eX controller (any version) OR iStar Ultra/Ultra LT running firmware prior to 6.6.B
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bd001b03-be1d-4283-83d0-ae80228c0546Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.