Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
A stack-based buffer overflow vulnerability in Johnson Controls Software House iSTAR Configuration Utility (ICU) allows unauthenticated network-based attackers to execute arbitrary code. The vulnerability exists in versions prior to 6.9.5 and is remotely exploitable with no user interaction required. Successful exploitation could allow an attacker to run arbitrary commands on the system running ICU, potentially allowing modification or disruption of building automation configurations across interconnected systems.
- Network access to the ICU service port (typically HTTP/HTTPS)
- ICU version prior to 6.9.5 deployed and running
- No authentication required to exploit
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dbd04cc3-55c0-4dc1-be1b-a2db0216c903Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.