First published: Thu Apr 07 2022(Updated: )
Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2.
Credit: productsecurity@jci.com
Affected Software | Affected Version | How to fix |
---|---|---|
Johnsoncontrols Metasys Application And Data Server | >=10.0<10.1.5 | |
Johnsoncontrols Metasys Application And Data Server | >=11.0<11.0.2 | |
Johnsoncontrols Metasys Extended Application And Data Server | >=10.0<10.1.5 | |
Johnsoncontrols Metasys Extended Application And Data Server | >=11.0<11.0.2 | |
Johnsoncontrols Metasys Open Application Server | >=10.0<10.1.5 | |
Johnsoncontrols Metasys Open Application Server | >=11.0<11.0.2 | |
Johnson Controls Inc. Metasys ADS/ADX/OAS Versions 10 and 11 |
Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5.
Update all Metasys ADS/ADX/OAS 11 versions with patch 11.0.2.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SSRF vulnerability is CVE-2021-36202.
The severity rating of CVE-2021-36202 is high (8.8).
The SSRF vulnerability in Johnson Controls Metasys allows an authenticated attacker to inject malicious code into the MUI PDF export feature.
This vulnerability affects all 10 versions prior to 10.1.5 and all 11 versions prior to 11.0.2 of Johnson Controls Metasys.
To fix the SSRF vulnerability, update Johnson Controls Metasys to version 10.1.5 or 11.0.2 or later.