CVE-2023-4486 (GCVE-0-2023-4486)

Vulnerability from cvelistv5 – Published: 2023-12-07 19:55 – Updated: 2025-05-28 13:52
VLAI?
Summary
Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to versions 11.0.6 and 12.0.4 and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Assigner
jci
Impacted products
Vendor Product Version
Johnson Controls Metasys NAE55/SNE/SNC Affected: 12.0 , < 12.0.4 (custom)
Affected: 11.0 , < 11.0.6 (custom)
Create a notification for this product.
    Johnson Controls Facility Explorer F4-SNC Affected: 12.0 , < 12.0.4 (custom)
Affected: 11.0 , < 11.0.6 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:31:06.240Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4486",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-23T05:01:05.723101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T13:52:00.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Metasys NAE55/SNE/SNC",
          "vendor": "Johnson Controls",
          "versions": [
            {
              "lessThan": "12.0.4",
              "status": "affected",
              "version": "12.0",
              "versionType": "custom"
            },
            {
              "lessThan": "11.0.6",
              "status": "affected",
              "version": "11.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Facility Explorer F4-SNC",
          "vendor": "Johnson Controls",
          "versions": [
            {
              "lessThan": "12.0.4",
              "status": "affected",
              "version": "12.0",
              "versionType": "custom"
            },
            {
              "lessThan": "11.0.6",
              "status": "affected",
              "version": "11.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2023-12-07T19:24:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \n\nversions 11.0.6 and 12.0.4\n\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \n\nversions 11.0.6 and 12.0.4\n\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114 Authentication Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-19T16:57:41.349Z",
        "orgId": "7281d04a-a537-43df-bfb4-fa4110af9d01",
        "shortName": "jci"
      },
      "references": [
        {
          "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update Metasys NAE55, SNE, and SNC engines to version 12.0.4.\u003cbr\u003e"
            }
          ],
          "value": "Update Metasys NAE55, SNE, and SNC engines to version 12.0.4.\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update Metasys NAE55, SNE, and SNC engines to version 11.0.6.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Update Metasys NAE55, SNE, and SNC engines to version 11.0.6.\n\n\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update Facility Explorer F4-SNC engine to version 12.0.4.\u003cbr\u003e"
            }
          ],
          "value": "Update Facility Explorer F4-SNC engine to version 12.0.4.\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate Facility Explorer F4-SNC engine to version 11.0.6. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "\n\n\nUpdate Facility Explorer F4-SNC engine to version 11.0.6. \u00a0\n\n\n\n\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nFor more information, contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS).\n\n\u003cbr\u003e"
            }
          ],
          "value": "\nFor more information, contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS).\n\n\n"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Uncontrolled Resource Consumption in Metasys and Facility Explorer",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7281d04a-a537-43df-bfb4-fa4110af9d01",
    "assignerShortName": "jci",
    "cveId": "CVE-2023-4486",
    "datePublished": "2023-12-07T19:55:39.265Z",
    "dateReserved": "2023-08-22T19:40:01.192Z",
    "dateUpdated": "2025-05-28T13:52:00.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:nae55_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"318A4239-1481-428C-B016-06E90553EA54\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:nae55:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"019B3C3A-BB07-4BC2-B3DB-1C0DEA374251\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:sne22000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"7FDD5E06-7317-43C5-8AF7-BA93493BE3ED\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:sne22000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62172D94-FE04-421D-82CE-591478DCFCE3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:sne11000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"1C20F153-371B-4D79-A792-DA6283339C9E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:sne11000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E057F276-8A92-4686-8A8F-ECB21B7CF684\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:sne10500_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"4E7BA2B1-EF29-4E71-B57D-5201590E67B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:sne10500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F50590BF-749B-4C98-831B-FD136C37D947\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:sne110l0_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"C1EA003B-2FA9-4F13-ADCF-B1259385F2FA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:sne110l0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBA6E1AC-53C1-45CC-803D-13E18D479CC8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:snc25150-0_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"47C1BE3E-D364-46C4-B297-EA0A5446656B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:snc25150-0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24AF3CDD-A0BE-41A6-9A82-2DE7D0FCD246\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:snc25150-04_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"24406024-FDF7-4C97-88A1-67A376E54BFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:snc25150-04:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91D059DE-095D-4243-B101-16913E68E461\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:snc16120-0_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"22431067-9203-4CCD-A6E7-A89A7B576A51\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:snc16120-0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D330345-BE9B-409C-BAA6-EB72A5CE9430\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:snc16120-04_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"321A5153-048F-4328-89CB-D7E57C72C914\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:snc16120-04:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73B490CE-EE4B-48B7-AD7D-2EFF95D0F45F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:f4-snc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"11.0.6\", \"matchCriteriaId\": \"A49D88F1-20F3-4F73-A3AC-0E5701005F8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:johnsoncontrols:f4-snc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.0.4\", \"matchCriteriaId\": \"DD9211CC-D01B-4E01-8813-996F7C3A59AC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:johnsoncontrols:f4-snc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"281D5513-A663-48DE-98D8-240C1FC767B5\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \\n\\nversions 11.0.6 and 12.0.4\\n\\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"En determinadas circunstancias, se podr\\u00edan enviar credenciales de autenticaci\\u00f3n no v\\u00e1lidas al endpoint de inicio de sesi\\u00f3n de los motores Johnson Controls Metasys NAE55, SNE y SNC anteriores a la versi\\u00f3n 12.0.4 y a los motores Facility Explorer F4-SNC anteriores a las versiones 11.0.6 y 12.0.4 para causar negaci\\u00f3n de servicio.\"}]",
      "id": "CVE-2023-4486",
      "lastModified": "2024-11-21T08:35:15.983",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"productsecurity@jci.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2023-12-07T20:15:38.530",
      "references": "[{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\", \"source\": \"productsecurity@jci.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\", \"source\": \"productsecurity@jci.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "productsecurity@jci.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"productsecurity@jci.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-4486\",\"sourceIdentifier\":\"productsecurity@jci.com\",\"published\":\"2023-12-07T20:15:38.530\",\"lastModified\":\"2024-11-21T08:35:15.983\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \\n\\nversions 11.0.6 and 12.0.4\\n\\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\\n\\n\"},{\"lang\":\"es\",\"value\":\"En determinadas circunstancias, se podr\u00edan enviar credenciales de autenticaci\u00f3n no v\u00e1lidas al endpoint de inicio de sesi\u00f3n de los motores Johnson Controls Metasys NAE55, SNE y SNC anteriores a la versi\u00f3n 12.0.4 y a los motores Facility Explorer F4-SNC anteriores a las versiones 11.0.6 y 12.0.4 para causar negaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"productsecurity@jci.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"productsecurity@jci.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:nae55_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"318A4239-1481-428C-B016-06E90553EA54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:nae55:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"019B3C3A-BB07-4BC2-B3DB-1C0DEA374251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:sne22000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"7FDD5E06-7317-43C5-8AF7-BA93493BE3ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:sne22000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62172D94-FE04-421D-82CE-591478DCFCE3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:sne11000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"1C20F153-371B-4D79-A792-DA6283339C9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:sne11000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E057F276-8A92-4686-8A8F-ECB21B7CF684\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:sne10500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"4E7BA2B1-EF29-4E71-B57D-5201590E67B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:sne10500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50590BF-749B-4C98-831B-FD136C37D947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:sne110l0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"C1EA003B-2FA9-4F13-ADCF-B1259385F2FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:sne110l0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA6E1AC-53C1-45CC-803D-13E18D479CC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:snc25150-0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"47C1BE3E-D364-46C4-B297-EA0A5446656B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:snc25150-0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24AF3CDD-A0BE-41A6-9A82-2DE7D0FCD246\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:snc25150-04_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"24406024-FDF7-4C97-88A1-67A376E54BFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:snc25150-04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D059DE-095D-4243-B101-16913E68E461\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:snc16120-0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"22431067-9203-4CCD-A6E7-A89A7B576A51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:snc16120-0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D330345-BE9B-409C-BAA6-EB72A5CE9430\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:snc16120-04_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"321A5153-048F-4328-89CB-D7E57C72C914\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:snc16120-04:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73B490CE-EE4B-48B7-AD7D-2EFF95D0F45F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:f4-snc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.0.6\",\"matchCriteriaId\":\"A49D88F1-20F3-4F73-A3AC-0E5701005F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:johnsoncontrols:f4-snc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.0.4\",\"matchCriteriaId\":\"DD9211CC-D01B-4E01-8813-996F7C3A59AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:johnsoncontrols:f4-snc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281D5513-A663-48DE-98D8-240C1FC767B5\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\",\"source\":\"productsecurity@jci.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\",\"source\":\"productsecurity@jci.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:31:06.240Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-4486\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-23T05:01:05.723101Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T13:51:57.524Z\"}}], \"cna\": {\"title\": \"Uncontrolled Resource Consumption in Metasys and Facility Explorer\", \"source\": {\"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-114\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-114 Authentication Abuse\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Johnson Controls\", \"product\": \"Metasys NAE55/SNE/SNC\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0\", \"lessThan\": \"12.0.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"11.0\", \"lessThan\": \"11.0.6\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Johnson Controls\", \"product\": \"Facility Explorer F4-SNC\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0\", \"lessThan\": \"12.0.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"11.0\", \"lessThan\": \"11.0.6\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update Metasys NAE55, SNE, and SNC engines to version 12.0.4.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update Metasys NAE55, SNE, and SNC engines to version 12.0.4.\u003cbr\u003e\", \"base64\": false}]}, {\"lang\": \"en\", \"value\": \"Update Metasys NAE55, SNE, and SNC engines to version 11.0.6.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update Metasys NAE55, SNE, and SNC engines to version 11.0.6.\\n\\n\u003cbr\u003e\", \"base64\": false}]}, {\"lang\": \"en\", \"value\": \"Update Facility Explorer F4-SNC engine to version 12.0.4.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update Facility Explorer F4-SNC engine to version 12.0.4.\u003cbr\u003e\", \"base64\": false}]}, {\"lang\": \"en\", \"value\": \"\\n\\n\\nUpdate Facility Explorer F4-SNC engine to version 11.0.6. \\u00a0\\n\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eUpdate Facility Explorer F4-SNC engine to version 11.0.6. \u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003c/span\u003e\\n\\n\\n\\n\u003cbr\u003e\", \"base64\": false}]}, {\"lang\": \"en\", \"value\": \"\\nFor more information, contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS).\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nFor more information, contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS).\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2023-12-07T19:24:00.000Z\", \"references\": [{\"url\": \"https://www.johnsoncontrols.com/cyber-solutions/security-advisories\"}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-23-341-03\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \\n\\nversions 11.0.6 and 12.0.4\\n\\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to \\n\\nversions 11.0.6 and 12.0.4\\n\\n and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"7281d04a-a537-43df-bfb4-fa4110af9d01\", \"shortName\": \"jci\", \"dateUpdated\": \"2023-12-19T16:57:41.349Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-4486\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-28T13:52:00.866Z\", \"dateReserved\": \"2023-08-22T19:40:01.192Z\", \"assignerOrgId\": \"7281d04a-a537-43df-bfb4-fa4110af9d01\", \"datePublished\": \"2023-12-07T19:55:39.265Z\", \"assignerShortName\": \"jci\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…