Description
Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
Published: 2025-12-22
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg
Vendors & Products Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg

Mon, 22 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
Title Johnson Controls PowerG and IQPanel cleartext transmission of sensitive information
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Johnsoncontrols Iq Panels2 Iq Panels2+ Iqhub Iqpanel 4 Powerg
cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T14:09:49.340Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61738

cve-icon Vulnrichment

Updated: 2025-12-22T13:17:13.181Z

cve-icon NVD

Status : Deferred

Published: 2025-12-22T11:15:58.093

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-61738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:40:19Z

Weaknesses