Description
Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.
Published: 2025-12-22
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg
Vendors & Products Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg

Mon, 22 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.
Title Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG reusing a nonce, key pair in encryption
Weaknesses CWE-323
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N'}


Subscriptions

Johnsoncontrols Iq Panels2 Iq Panels2+ Iqhub Iqpanel 4 Powerg
cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T13:09:17.628Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61739

cve-icon Vulnrichment

Updated: 2025-12-22T13:09:12.133Z

cve-icon NVD

Status : Deferred

Published: 2025-12-22T11:15:58.277

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-61739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:40:20Z

Weaknesses