Discover the impact of CVE-2023-4486 on Johnson Controls engines, with details on exploitation, mitigation steps, and recommended updates. Learn more.
This CVE record details a vulnerability in Johnson Controls Metasys NAE55, SNE, and SNC engines, as well as Facility Explorer F4-SNC engines, potentially allowing denial-of-service attacks.
Understanding CVE-2023-4486
This vulnerability involves the transmission of invalid authentication credentials to the login endpoint of the affected Johnson Controls engines, leading to denial-of-service under certain conditions.
What is CVE-2023-4486?
The vulnerability in Johnson Controls engines, specifically Metasys NAE55, SNE, and SNC engines, and Facility Explorer F4-SNC engines, can be exploited by sending incorrect authentication credentials, causing denial-of-service.
The Impact of CVE-2023-4486
The impact of this vulnerability, known as CAPEC-114 Authentication Abuse, is rated as having a high availability impact with a base severity score of 7.5.
Technical Details of CVE-2023-4486
This vulnerability falls under CWE-400 Uncontrolled Resource Consumption and has a CVSS v3.1 base score of 7.5, indicating a high severity issue with low attack complexity and network access.
Vulnerability Description
The vulnerability allows attackers to exploit invalid authentication credentials to disrupt the affected Johnson Controls engines' functionality, potentially leading to denial-of-service.
Affected Systems and Versions
Johnson Controls Metasys NAE55, SNE, and SNC engines versions prior to 11.0.6 and 12.0.4, and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 are impacted by this vulnerability.
Exploitation Mechanism
Attackers can send incorrect authentication credentials to the login endpoint of the affected engines, triggering denial-of-service conditions.
Mitigation and Prevention
To address CVE-2023-4486, it is crucial to take immediate action to prevent potential exploitation and mitigate the risks associated with the vulnerability.
Immediate Steps to Take
Users are advised to update Johnson Controls Metasys NAE55, SNE, and SNC engines to version 12.0.4 or 11.0.6, and Facility Explorer F4-SNC engines to version 12.0.4 or 11.0.6 to eliminate the vulnerability.
Long-Term Security Practices
Implementing strong authentication mechanisms, network segmentation, and monitoring for unusual login activities can enhance the overall security posture of Johnson Controls engine deployments.
Patching and Updates
Regularly check for security updates and patches provided by Johnson Controls or authorized vendors to ensure that the systems are protected against known vulnerabilities.
For more detailed information or assistance, users are encouraged to reach out to their local Johnson Controls office or Authorized Building Control Specialists (ABCS) to address CVE-2023-4486 effectively.