The iSTAR Configuration Utility (ICU) tool leaks memory, which could result in the unintended exposure of unauthorized data from the Windows PC that ICU is running on.
https://www.cisa.gov/news-events/ics-advisories/icsa-25-146-01
https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories
Published: 2025-06-11
Updated: 2025-06-12
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: High
Base Score: 6.3
Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N
Severity: Medium
EPSS: 0.00016