Metrics
Affected Vendors & Products
No advisories yet.
Solution
a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater
Workaround
No workaround given by the vendor.
Mon, 22 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network. | |
| Title | Johnson Controls PowerG and IQPanel cleartext transmission of sensitive information | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jci
Published:
Updated: 2025-12-22T14:09:49.340Z
Reserved: 2025-09-30T15:51:17.096Z
Link: CVE-2025-61738
Updated: 2025-12-22T13:17:13.181Z
Status : Received
Published: 2025-12-22T11:15:58.093
Modified: 2025-12-22T11:15:58.093
Link: CVE-2025-61738
No data.
OpenCVE Enrichment
No data.