Johnson Controls exacqVision client and exacqVision server
A vulnerability in Johnson Controls exacqVision Client and Server due to insufficient encryption key length and exchange procedures allows an attacker with network access to the communications channel to decrypt data transmitted between the server and client. The vulnerability affects the confidentiality of communications, potentially exposing surveillance feeds, credentials, and access control information. While this has high attack complexity and no known public exploitation, the impact to surveillance system confidentiality is significant.
- Network access to communications between exacqVision Server and Client (can be on-site or via compromised internal network segment)
- Ability to capture encrypted traffic (network sniffing or man-in-the-middle position)
- Computational resources to perform cryptanalysis on weak encryption scheme
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b3e1bbb4-9a9b-4348-a0c5-beb468f34dc1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.