Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A)
Johnson Controls iSTAR door controllers contain multiple command injection and access control vulnerabilities (CWE-78, CWE-349, CWE-1392, CWE-1299, CWE-922) that allow authenticated attackers to execute arbitrary commands and modify device firmware. Successful exploitation may allow an attacker to alter door access control logic, lock users in or out of secured areas, and persist changes through firmware modification. iSTAR Ultra and variants are vulnerable in versions prior to 6.9.8. iSTAR Edge G2 devices in all versions are affected and will not receive a vendor fix. The hardware manual requires iSTAR controllers be installed in restricted-access, protected areas to lower the risk of physical tampering.
- Valid user credentials for the iSTAR controller management interface
- Network access to the iSTAR controller on the management port
- Authentication to the device (not unauthenticated)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5d90ea3b-84c9-4f5c-896b-fdd04b686bc0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.