First published: Thu Feb 09 2023(Updated: )
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.
Credit: productsecurity@jci.com
Affected Software | Affected Version | How to fix |
---|---|---|
Johnson Controls System Configuration Tool (SCT) | <14.2.3 | 14.2.3 |
Johnson Controls System Configuration Tool (SCT) | <15.0.3 | 15.0.3 |
Johnson Controls Metasys System Configuration Tool | >=14.0<14.2.3 | |
Johnson Controls Metasys System Configuration Tool | >=15.0<15.0.3 |
Update SCT version 14 with patch 14.2.3
Update SCT version 15 with patch 15.0.3
Contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-21940 is high.
CVE-2022-21940 allows access to sensitive cookies in the HTTPS session without the 'Secure' attribute, which could compromise the security of the SCT.
Versions 14 prior to 14.2.3 and version 15 prior to 15.0.3 of Johnson Controls System Configuration Tool (SCT) are affected by CVE-2022-21940.
To fix CVE-2022-21940, it is recommended to update Johnson Controls System Configuration Tool (SCT) to version 14.2.3 or 15.0.3 or later.
You can find more information about CVE-2022-21940 on the following resources: CISA website (https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03) and Johnson Controls Security Advisories (https://www.johnsoncontrols.com/cyber-solutions/security-advisories).