Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.
Advisories

No advisories yet.

Fixes

Solution

a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.
Title Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG use of Cryptographically Weak Pseudo-Random Number Generator
Weaknesses CWE-338
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T16:19:25.130Z

Reserved: 2025-02-07T14:15:53.879Z

Link: CVE-2025-26379

cve-icon Vulnrichment

Updated: 2025-12-22T16:19:19.954Z

cve-icon NVD

Status : Received

Published: 2025-12-22T15:16:00.070

Modified: 2025-12-22T15:16:00.070

Link: CVE-2025-26379

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses