First published: Fri Oct 28 2022(Updated: )
All versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
Credit: productsecurity@jci.com
Affected Software | Affected Version | How to fix |
---|---|---|
Johnsoncontrols Cevas | <1.01.46 | |
CKS, a subsidiary of Johnson Controls Inc. All CEVAS versions prior to 1.01.46 |
Upgrade CEVAS to version 1.01.46. Contact CKS for the upgrade.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36206 is a vulnerability where all versions of CEVAS prior to 1.01.46 do not sufficiently validate user-controllable input and could allow a user to bypass authentication and retrieve data with specially crafted SQL queries.
CVE-2021-36206 has a severity score of 6.1, which is classified as critical.
The affected software for CVE-2021-36206 is CEVAS versions prior to 1.01.46.
To fix CVE-2021-36206, it is recommended to update CEVAS to version 1.01.46 or higher.
You can find more information about CVE-2021-36206 on the official websites of CISA (https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-05) and Johnson Controls (https://www.johnsoncontrols.com/cyber-solutions/security-advisories).