First published: Thu Jul 04 2024(Updated: )
Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information.
Credit: productsecurity@jci.com
Affected Software | Affected Version | How to fix |
---|---|---|
Johnson Controls Kantech KT1 Door Controller | ||
Johnson Controls Kantech KT2 Door Controller | ||
Johnson Controls Kantech KT400 Door Controller |
Update Kantech door controllers as follows: * Update Kantech KT1 Door Controller to at least version 3.10.12 * Update Kantech KT2 Door Controller to at least version 3.10.12 * Update Kantech KT400 Door Controller to at least version 3.03
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32754 is categorized as a medium severity vulnerability due to the potential exposure of sensitive information.
To mitigate CVE-2024-32754, ensure that the controllers are not left in factory reset mode for extended periods and configure them promptly.
CVE-2024-32754 exposes the MAC address, serial number, and firmware version of the controller during factory reset mode.
The affected products include the Johnson Controls Kantech KT1, KT2, and KT400 Door Controllers.
No, CVE-2024-32754 only broadcasts the sensitive information when the controller is in factory reset mode, and this stops once configured.