SB2024080241 - Multiple vulnerabilities in Johnson Controls exacqVision Web Service, exacqVision Server and exacqVision client
Published: August 2, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Use of GET Request Method With Sensitive Query Strings (CVE-ID: CVE-2024-32931)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected application exposes authentication token details within communications. A remote user can gain unauthorized access to sensitive information on the system.
2) Inadequate Encryption Strength (CVE-ID: CVE-2024-32758)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient key length and exchange. A remote attacker can decrypt communications between exacqVision Server and exacqVision Client.
3) Overly permissive cross-domain whitelist (CVE-ID: CVE-2024-32862)
The vulnerability allows a remote attacker to bypass the CORS protection mechanism.
The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A remote attacker can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and perform cross-site scripting attacks against the vulnerable application.
4) Cross-site request forgery (CVE-ID: CVE-2024-32863)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
5) Cleartext transmission of sensitive information (CVE-ID: CVE-2024-32864)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker on the local network can gain access to sensitive data.
6) Improper Certificate Validation (CVE-ID: CVE-2024-32865)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper validation of TLS certificates. A remote attacker on the local network can perform a man-in-the-middle (MitM) attack and intercept communications.
Remediation
Install update from vendor's website.
References
- https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-06
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-01
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-02
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-03
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-04
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-05