Metrics
Affected Vendors & Products
No advisories yet.
Solution
a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater
Workaround
No workaround given by the vendor.
Mon, 22 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets. | |
| Title | Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG use of Cryptographically Weak Pseudo-Random Number Generator | |
| Weaknesses | CWE-338 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jci
Published:
Updated: 2025-12-22T16:19:25.130Z
Reserved: 2025-02-07T14:15:53.879Z
Link: CVE-2025-26379
Updated: 2025-12-22T16:19:19.954Z
Status : Received
Published: 2025-12-22T15:16:00.070
Modified: 2025-12-22T15:16:00.070
Link: CVE-2025-26379
No data.
OpenCVE Enrichment
No data.