communications with ICU, which may allow an attacker to gain unauthorized access
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-30539 | The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access |
Solution
• Replace the iSTAR Pro, Edge and eX door controllers with a current generation iSTAR door controller (such as iSTAR Ultra G2) which supports authentication and prevents the ICU from making configuration changes. • Ensure your iSTAR Ultra and Ultra LT door controllers are running firmware 6.6.B or greater.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 24 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Johnsoncontrols
Johnsoncontrols icu Johnsoncontrols software House Istar Pro Door Controller |
|
| CPEs | cpe:2.3:h:johnsoncontrols:icu:*:*:*:*:*:*:*:* cpe:2.3:h:johnsoncontrols:software_house_istar_pro_door_controller:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Johnsoncontrols
Johnsoncontrols icu Johnsoncontrols software House Istar Pro Door Controller |
|
| Metrics |
ssvc
|
Thu, 24 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain circumstances communications between the ICU tool and an iSTAR Pro door controller is susceptible to Machine-in-the-Middle attacks which could impact door control and configuration. | The iSTAR door controllers running firmware prior to version 6.6.B, does not support authenticated communications with ICU, which may allow an attacker to gain unauthorized access |
| Title | Johnson Controls Software House iStar Pro Door Controller | Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool |
| References |
|
Status: PUBLISHED
Assigner: jci
Published:
Updated: 2025-04-24T20:05:35.350Z
Reserved: 2024-04-17T17:26:35.180Z
Link: CVE-2024-32752
Updated: 2024-08-02T02:20:35.187Z
Status : Awaiting Analysis
Published: 2024-06-06T21:15:48.523
Modified: 2025-04-24T20:15:31.463
Link: CVE-2024-32752
No data.
OpenCVE Enrichment
No data.
EUVD