Johnson Controls exacqVision Server
Johnson Controls exacqVision Server versions 24.03 and earlier contain a TLS validation vulnerability (CWE-295) that allows an attacker on the same network segment to perform a man-in-the-middle attack and intercept communications between the Client and Server. This could allow interception of surveillance video streams and potential manipulation of control commands. The vulnerability requires the attacker to be on the same network segment and has high attack complexity, but no authentication is required. The advisory does not report active exploitation in the wild.
- Network access to the same network segment (AV:A) as exacqVision Client and Server
- User interaction required (UI:R) - likely a user action to trigger the vulnerable code path
- No authentication required (PR:N)
- High attack complexity - specific conditions must be met for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f3eedd0b-2c50-42da-8a6d-51a3c4f96fd9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.