First published: Sun Mar 29 2015(Updated: )
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read password hashes via a POST request.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Johnson Controls Metasys | =4.1 | |
Johnson Controls Metasys | =6.5 | |
Johnson Controls Application And Data Server | ||
Johnson Controls Extended Application and Data Server | ||
Johnson Controls Lonworks Control Server LCS8520 | ||
Johnsoncontrols Network Automation Engine 5510-2u | ||
Johnson Controls Network Automation Engine | ||
Johnson Controls Network Automation Engine | ||
Johnson Controls Network Automation Engine | ||
Johnson Controls Network Automation Engine 5521-2 | ||
Johnson Controls Network Integration Engine 5510-2 | ||
Johnson Controls Network Integration Engine 5511-2 | ||
Johnson Controls NXE8500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5427 has been assigned a medium severity rating due to its ability to allow remote attackers to access sensitive data.
CVE-2014-5427 affects Johnson Controls Metasys versions 4.1 through 6.5, including various servers and control systems.
CVE-2014-5427 allows unauthorized remote attackers to read sensitive files due to improper access controls in the affected software.
To mitigate CVE-2014-5427, it is recommended to upgrade to the latest version of Johnson Controls Metasys that addresses this vulnerability.
As of now, the primary solution for CVE-2014-5427 is to apply available patches or updates provided by Johnson Controls.