Skip to content
  Tuesday 14 April 2026
Trending
September 20, 2025Alert: LastPass Identifies Fake Repos on macOS Spreading Atomic Infostealer! June 5, 2025In today’s fast-paced world, it can be easy to feel overwhelmed by the constant barrage of information and demands on our time. It’s no wonder that stress and anxiety are on the rise, with many people struggling to find a balance between work, family, and personal responsibilities. However, it’s important to remember that taking care of our mental health is just as crucial as caring for our physical well-being.<br /> <br /> One way to combat stress and anxiety is to practice mindfulness. This involves being fully present in the moment and paying attention to our thoughts and feelings without judgment. By practicing mindfulness regularly, we can learn to manage our stress levels more effectively and cultivate a sense of peace and calm in our daily lives.<br /> <br /> Another important aspect of mental health is self-care. This means taking the time to prioritize our own well-being and engage in activities that bring us joy and relaxation. Whether it’s going for a walk in nature, practicing yoga, or spending time with loved ones, self-care is essential for maintaining a healthy mind and body.<br /> <br /> It’s also important to seek support when needed. Talking to a trusted friend, family member, or mental health professional can provide valuable insight and guidance during difficult times. Remember, it’s not a sign of weakness to ask for help – in fact, it takes courage and strength to reach out for support.<br /> <br /> Overall, taking care of our mental health is a lifelong journey that requires dedication and effort. By practicing mindfulness, engaging in self-care activities, and seeking support when needed, we can cultivate a sense of well-being and resilience that will help us navigate life’s challenges with grace and strength. Remember, you are not alone – there are resources and people available to support you on your mental health journey. May 10, 2025Embedded Cybersecurity Software Engineer I (Onsite) July 15, 2025CISA Releases Six Industrial Control Systems Advisories December 20, 2025Cybersecurity Council Program Manager (Exempt) April 21, 2025IT Auditor 3 (Cybersecurity Audit) INTERNAL ONLY September 29, 2024Master the Art of Spotting Phishing Links with Expert Tips February 28, 2025Florida Virtual School Flex Computer and Network Security Fundamentals/Cybersecurity Essentials Instructor Florida Certified January 27, 2025Cybersecurity Lead/Information System Security Officer April 10, 2025Cybersecurity Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Johnson Controls OpenBlue Enterprise Manager Data Collector
Threat Advisories

Johnson Controls OpenBlue Enterprise Manager Data Collector

Mister CybersecurityMister Cybersecurity—May 18, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 10.0 
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Johnson Controls Inc.
  • Equipment: OpenBlue Enterprise Manager Data Collector
  • Vulnerabilities: Improper Authentication, Exposure of Sensitive Information to an Unauthorized Actor

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker, under certain circumstances, to make application programming interface (API) calls to the OpenBlue Enterprise Manager Data Collector, which do not require authentication and may expose sensitive information to an unauthorized user.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Johnson Controls products are affected: 

  • OpenBlue Enterprise Manager Data Collector: Firmware versions prior to 3.2.5.75

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER AUTHENTICATION CWE-287

Under certain circumstances, API calls to the OpenBlue Enterprise Manager Data Collector do not require authentication.

CVE-2023-2024 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).

3.2.2 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200

More stories

Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC

February 5, 2025

CISA Adds One Known Exploited Vulnerability to Catalog

December 4, 2024

Delta Electronics CNCSoft-G2 | CISA

October 10, 2024

Siemens TeleControl Server Basic SQL

April 22, 2025

Under certain circumstances, API calls to the OpenBlue Enterprise Manager Data Collector may expose sensitive information to an unauthorized user.

CVE-2023-2025 has been assigned to this vulnerability. A CVSS v3 base score of 5.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Ireland

3.4 RESEARCHER

Rushank Shetty, Security Researcher at Northwestern Mutual, reported this vulnerability to Johnson Controls, Inc.; Johnson Controls, Inc. reported this vulnerability to CISA.

4. MITIGATIONS

Johnson Controls recommends updating OpenBlue Enterprise Manager Data Collector firmware to version 3.2.5.75. Users must contact Johnson Controls to obtain the update.

For more information, refer to Johnson Controls Product Security Advisory JCI-PSA-2023-04 v1

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Mitsubishi Electric MELSEC WS Series
CISA Releases Five Industrial Control Systems Advisories
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Threat Advisories

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

April 13, 20260
Threat Advisories

Contemporary Controls BASC 20T | CISA

April 9, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Lead Cybersecurity WAF Engineer
  • Senior Manager, Cybersecurity Detection Engineering
  • Lead Cybersecurity WAF Engineer
  • Lead Cybersecurity WAF Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures