Johnson Controls iSTAR Configuration Utility < 6.9.8 Stack-based Buffer Overflow

high Nessus Plugin ID 298252

Synopsis

A door controller configuration application installed on the remote Windows host is affected by a buffer overflow vulnerability.

Description

The version of Johnson Controls iSTAR Configuration Utility (ICU) installed on the remote Windows host is prior to 6.9.8. It is, therefore, affected by a stack-based buffer overflow vulnerability that could result in failure within the operating system of the machine hosting the ICU tool.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Johnson Controls iSTAR Configuration Utility version 6.9.8 or later.

See Also

https://www.tenable.com/security/research/tra-2025-26

https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-04

https://tyco.widen.net/s/bxhdzcjkgc/jci-psa-2026-03

Plugin Details

Severity: High

ID: 298252

File Name: johnson_controls_istar_icu_6_9_8.nasl

Version: 1.1

Type: local

Agent: windows

Family: Windows

Published: 2/6/2026

Updated: 2/6/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2025-26386

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4

Risk Factor: High

Base Score: 7.1

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: x-cpe:/a:johnsoncontrols:istar_configuration_utility

Required KB Items: installed_sw/Johnson Controls iSTAR Configuration Utility

Patch Publication Date: 1/28/2026

Vulnerability Publication Date: 1/28/2026

Reference Information

CVE: CVE-2025-26386