Johnson Controls PowerG, IQPanel and IQHub (Update A)
Johnson Controls PowerG, IQPanel 2, IQPanel 2+, IQPanel 4, and IQHub contain cryptographic and key generation weaknesses in their wireless security protocols. These vulnerabilities include improper randomness in key generation (CWE-338), weak encryption (CWE-319), and insufficient cryptographic strength (CWE-323). Exploitation could allow an attacker within wireless range to read encrypted traffic, modify encrypted communications, or replay captured wireless messages during device pairing and enrollment.
- Physical proximity to facility (wireless range, typically 100-300 feet depending on antenna)
- Ability to transmit wireless signals on the frequency used by PowerG/IQPanel devices
- Access during device pairing or enrollment phase (when initial key exchange occurs)
- No PIN code protection during enrollment, or ability to observe or guess PIN code
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f74d16b5-8d1f-4251-8db1-e11b04c0eee2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.