Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Desktop 1 1
Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

30 January 2026 09:09

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified as CVE-2025-26385, has been assessed with a CVSS score of 10, suggesting a critical impact and potential ease of exploitation.

The flaw affects Metasys , primarily the Application and Data Server (ADS) and its associated configuration tools. If exploited maliciously, this vulnerability could allow attackers to remotely execute SQL commands, potentially gaining control of data related to the management of physical building environments.

The vulnerability is widespread across the Johnson Controls ecosystem and affects several key components of the Metasys line:

  • Application and Data Server (ADS) and Extended ADX (versions ≤ Metasys 14.1).
  • LCS8500 and NAE8500 motors (versions ≥ 12.0 and ≤ 14.1).
  • System Configuration Tool (SCT) (versions ≤ 17.1).
  • Controller Configuration Tool (CCT) (versions ≤ 17.0).

It’s not simply a data leak risk; it’s a command-and-control issue. The advisory warns that successful exploitation could lead to “alteration or loss of data,” which, in the context of building automation, could involve manipulating environmental controls, deleting historical records, or completely halting operations.

Johnson Controls and CISA urge administrators to take immediate action. The primary solution is to download and install the Metasys patch for GIV-165989 from the company’s licensing portal.

Furthermore, the advisory emphasizes the importance of network hygiene. Administrators are advised to follow the ” Metasys Release 14 Hardening Guide” to ensure that each “Metasys installation is on a segmented network and not exposed to untrusted networks such as the Internet.”

For organizations unable to apply the patch promptly, the advisory represents a concrete network defense measure. Closing inbound TCP port 1433 can protect against exploitation of this vulnerability. This port happens to be the default port for SQL Server traffic, confirming the nature of the attack vector used.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.