Metrics
Affected Vendors & Products
No advisories yet.
Solution
Johnson Controls recommends the following mitigations: Host-based certificates using TLS 1.2: * Quickest solution * No Upgrade required to specific C•CURE or iSTAR software/firmware versions * Requires downloading a new certificate to all iSTAR panels simultaneously, resulting in a brief system downtime Convert encryption mode to TLS 1.3, per cluster: * Requires firmware 6.9.0 or higher, and C•CURE 9000 v2.90 SP3 or higher * Enables phased implementation by cluster, minimizing disruption * Note: TLS 1.3 is not supported on iSTAR eX, iSTAR Edge, and iSTAR Ultra LT panels Upgrade legacy panels to new G2 hardware: * Recommended for smaller systems due to time constraints * Applies primarily to iSTAR eX, iSTAR Edge, and iSTAR LT panels
Workaround
No workaround given by the vendor.
Wed, 17 Dec 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires. | |
| Title | iSTAR- Improper Validation of Certificate Expiration | |
| Weaknesses | CWE-298 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jci
Published:
Updated: 2025-12-17T15:09:46.607Z
Reserved: 2025-09-30T15:51:17.096Z
Link: CVE-2025-61736
No data.
Status : Received
Published: 2025-12-17T13:15:58.217
Modified: 2025-12-17T13:15:58.217
Link: CVE-2025-61736
No data.
OpenCVE Enrichment
No data.