Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Johnson Controls iSTAR Configuration Utility (ICU) Tool Multiple Vulnerabilities

High

Synopsis

Multiple input validation issues exist in the iSTAR Configuration Utility (ICU) tool. We are working with the vendor for full remediation. Once fully remediated, we will update with technical details.

Solution

A solution has yet to be released. Restrict access to the application and environment.

Disclosure Timeline

May 22, 2025 - Vulnerabilities discovered.
May 22, 2025 - Tenable requests security contact and notes they can't use Johnson Controls' PGP key.
May 27, 2025 - Johnson Controls replies with email address to use.
May 28, 2025 - Tenable sends disclosure.
May 30, 2025 - Johnson Controls indicates they are unable to receive the attachments.
May 30, 2025 - Tenable sends them a different way.
June 2, 2025 - Johnson Controls acknowledges they are analyzing the reports and are checking to see if they are duplicates of other reports. They will give an update post-analysis.
June 9, 2025 - Johnson Controls replies that they were able to reproduce the issue and will be scheduling work for the end of 2025.
June 10, 2025 - Tenable replies that the end of 2025 would be well past our intended disclosure date.
June 17, 2025 - Johnson Controls requests information about test setup.
June 17, 2025 - Tenable replies with relevant information.
July 7, 2025 - Tenable asks for a status update.
July 9, 2025 - Johnson Controls replies that they have reserved a CVE for the first issue, and proposes different CVSS scoring.
July 9, 2025 - Tenable replies asking about the remaining issues and provides justification for our CVSS assessment.
July 16, 2025 - Johnson Controls replies that they are raising at least two CVEs for the three issues and their targeted fix date is December 2025.
July 21, 2025 - Tenable receives an invite to coordinate this issue via VINCE.
July 24, 2025 - Tenable replies via email asking clarifying questions and providing another explanation around Windows Defender firewall usage.
July 29, 2025 - Tenable receives a notification from CISA in VINCE platform to communicate in VINCE.
August 5, 2025 - Johnson Controls provides arguments for various CVSS aspects and mentions that all 3 issues will be lumped into one CVE.
August 5, 2025 - Tenable responds to the CVSS scoring items and reminds that our public disclosure date is August 26, 2025. Tenable includes our public disclosure policy and asks about Johnson Controls targeted date of December 2025.
August 11, 2025 - Johnson Controls provides arguments for various CVSS aspects.
August 11, 2025 - Tenable responds to the CVSS scoring items and asks if Johnson Controls is still reviewing our note about the disclosure deadline rapidly approaching and asking to schedule a call to discuss contended items.
August 18, 2025 - Johnson Controls responds, continuing their position around CVSS score and providing a few timeslots to have a call to discuss.
August 19, 2025 - Tenable responds with preferred time for call. Johnson Controls sends a meeting invite to Tenable. CISA requests to be added to the call as an observer.
August 20, 2025 - Tenable and Johnson Controls meet and decide on some elements of CVSS score and single CVE count.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2025-26386
Tenable Advisory ID: TRA-2025-26
CVSSv4 Base Score:
7.1
CVSSv4 Vector:
AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
Johnson Controls iSTAR Configuration Utility (ICU) Tool
Risk Factor:
High

Advisory Timeline

August 26, 2025 - Initial release.