CVE-2022-21941

All versions of iSTAR Ultra prior to version 6.8.9.CU01 are vulnerable to a command injection that could allow an unauthenticated user root access to the system.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-11 Third Party Advisory US Government Resource
https://www.johnsoncontrols.com/cyber-solutions/security-advisories Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:johnsoncontrols:istar_ultra_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:johnsoncontrols:istar_ultra:-:*:*:*:*:*:*:*

History

09 Sep 2022, 15:15

Type Values Removed Values Added
Summary All versions of iSTAR Ultra prior to version 6.8.9.CU01are vulnerable to a command injection that could allow an unauthenticated user root access to the system. All versions of iSTAR Ultra prior to version 6.8.9.CU01 are vulnerable to a command injection that could allow an unauthenticated user root access to the system.

07 Sep 2022, 15:56

Type Values Removed Values Added
First Time Johnsoncontrols
Johnsoncontrols istar Ultra
Johnsoncontrols istar Ultra Firmware
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:o:johnsoncontrols:istar_ultra_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:johnsoncontrols:istar_ultra:-:*:*:*:*:*:*:*
References (CERT) https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-11 - (CERT) https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-11 - Third Party Advisory, US Government Resource
References (CONFIRM) https://www.johnsoncontrols.com/cyber-solutions/security-advisories - (CONFIRM) https://www.johnsoncontrols.com/cyber-solutions/security-advisories - Mitigation, Vendor Advisory

31 Aug 2022, 16:53

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-31 16:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-21941

Mitre link : CVE-2022-21941

CVE.ORG link : CVE-2022-21941


JSON object : View

Products Affected

johnsoncontrols

  • istar_ultra_firmware
  • istar_ultra
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')