Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.
Advisories

No advisories yet.

Fixes

Solution

Johnson Controls recommends the following mitigations: Host-based certificates using TLS 1.2: * Quickest solution * No Upgrade required to specific C•CURE or iSTAR software/firmware versions * Requires downloading a new certificate to all iSTAR panels simultaneously, resulting in a brief system downtime Convert encryption mode to TLS 1.3, per cluster: * Requires firmware 6.9.0 or higher, and C•CURE 9000 v2.90 SP3 or higher * Enables phased implementation by cluster, minimizing disruption * Note: TLS 1.3 is not supported on iSTAR eX, iSTAR Edge, and iSTAR Ultra LT panels Upgrade legacy panels to new G2 hardware: * Recommended for smaller systems due to time constraints * Applies primarily to iSTAR eX, iSTAR Edge, and iSTAR LT panels


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 13:00:00 +0000

Type Values Removed Values Added
Description Successful exploitation of this vulnerability could result in the product failing to re-establish communication once the certificate expires.
Title iSTAR- Improper Validation of Certificate Expiration
Weaknesses CWE-298
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-17T15:09:46.607Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61736

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T13:15:58.217

Modified: 2025-12-17T13:15:58.217

Link: CVE-2025-61736

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses