First published: Wed Aug 01 2018(Updated: )
In Johnson Controls Metasys System Versions 8.0 and prior and BCPro (BCM) all versions prior to 3.0.2, this vulnerability results from improper error handling in HTTP-based communications with the server, which could allow an attacker to obtain technical information.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Johnsoncontrols Bcpro | <3.0.2 | |
Johnsoncontrols Metasys System | <=8.0 | |
<3.0.2 | ||
<=8.0 |
Johnson Controls recommends the following mitigations: * This issue was remediated in Metasys v8.1 (April, 2016). Users should upgrade to the latest product version (9.0). For Metasys information, contact your Metasys field service/sales representative. * This issue was remediated in the BCPro Workstation in BCPro v3.0 (October, 2017) and mitigated for the BACnet Router and Gateway in BCPro v3.0.2 (June, 2018). Users should upgrade to the latest product versions. For more BCPro information, contact your BCPro sales and support representative.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Johnson Controls Metasys System vulnerability is CVE-2018-10624.
The severity of CVE-2018-10624 is medium with a CVSS score of 6.5.
The affected software for CVE-2018-10624 includes Johnson Controls BCPro versions prior to 3.0.2 and Johnson Controls Metasys System versions prior to 8.0.
CVE-2018-10624 is a vulnerability in Johnson Controls Metasys System and BCPro, allowing an attacker to obtain technical information by exploiting improper error handling in HTTP-based communications with the server.
Yes, there are references available for CVE-2018-10624. You can find more information at the following links: http://www.securityfocus.com/bid/104937 and https://ics-cert.us-cert.gov/advisories/ICSA-18-212-02.