Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
Advisories

No advisories yet.

Fixes

Solution

a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
Title Johnson Controls PowerG and IQPanel cleartext transmission of sensitive information
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T14:09:49.340Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61738

cve-icon Vulnrichment

Updated: 2025-12-22T13:17:13.181Z

cve-icon NVD

Status : Received

Published: 2025-12-22T11:15:58.093

Modified: 2025-12-22T11:15:58.093

Link: CVE-2025-61738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses