First published: Tue Jul 25 2023(Updated: )
An unauthorized user could gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.
Credit: productsecurity@jci.com productsecurity@jci.com
Affected Software | Affected Version | How to fix |
---|---|---|
Johnsoncontrols Iq Wifi 6 Firmware | <2.0.2 | |
Johnsoncontrols Iq Wifi 6 | ||
: Johnson Controls Inc. IQ Wifi 6: All firmware versions prior to 2.0.2 |
Upgrade IQ Wifi 6 firmware to version 2.0.2. The firmware update will be pushed to all available devices in the field. The firmware update can also be manually loaded by applying the patch tag “iqwifi2.0.2” on the device after navigating to its firmware update page.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-3548.
The severity of CVE-2023-3548 is critical with a CVSS score of 9.8.
An unauthorized user can gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.
IQ Wifi 6 versions prior to 2.0.2 are affected by CVE-2023-3548.
To fix CVE-2023-3548, you should upgrade to IQ Wifi 6 version 2.0.2 or later.