Description

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted organizations to a critical security weakness impacting Johnson Controls, a major provider of smart building and automation solutions. The vulnerability, identified as CVE-2025-26385, has been assigned the highest possible CVSS score of 10, reflecting both its severe potential impact and the relative ease with which it could be exploited. The issue affects the Metasys building automation platform and raises serious concerns for environments that rely on automated control of physical infrastructure. At the center of the issue is improper handling of input data within the Metasys Application and Data Server and associated configuration utilities. This flaw could enable unauthenticated attackers to remotely inject and execute SQL commands, giving them the ability to manipulate or interfere with systems responsible for managing building operations. Beyond the risk of data exposure, successful exploitation could lead to unauthorized modification or deletion of operational data, disruption of building controls, or loss of critical system logs, effectively turning the vulnerability into a command-and-control risk rather than a simple data breach. The exposure spans multiple Metasys components, including ADS and Extended ADX deployments up to version 14.1, LCS8500 and NAE8500 engines running versions between 12.0 and 14.1, as well as the System Configuration Tool and Controller Configuration Tool within their affected version ranges. Johnson Controls and CISA recommend immediate application of the vendor-provided patch (GIV-165989) via the License Portal. Where patching is not immediately feasible, organizations are advised to block inbound traffic on TCP port 1433 to reduce exposure, and to ensure Metasys environments are properly segmented and isolated from untrusted networks in line with the Metasys Release 14 hardening guidance.