7.5

CVE-2023-4486

Under certain circumstances, invalid authentication credentials could be sent to the login endpoint of Johnson Controls Metasys NAE55, SNE, and SNC engines prior to 

versions 11.0.6 and 12.0.4

 and Facility Explorer F4-SNC engines prior to versions 11.0.6 and 12.0.4 to cause denial-of-service.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JohnsoncontrolsNae55 Firmware Version < 12.0.4
   JohnsoncontrolsNae55 Version-
JohnsoncontrolsSne22000 Firmware Version < 12.0.4
   JohnsoncontrolsSne22000 Version-
JohnsoncontrolsSne11000 Firmware Version < 12.0.4
   JohnsoncontrolsSne11000 Version-
JohnsoncontrolsSne10500 Firmware Version < 12.0.4
   JohnsoncontrolsSne10500 Version-
JohnsoncontrolsSne110l0 Firmware Version < 12.0.4
   JohnsoncontrolsSne110l0 Version-
JohnsoncontrolsSnc25150-0 Firmware Version < 12.0.4
   JohnsoncontrolsSnc25150-0 Version-
JohnsoncontrolsSnc25150-04 Firmware Version < 12.0.4
   JohnsoncontrolsSnc25150-04 Version-
JohnsoncontrolsSnc16120-0 Firmware Version < 12.0.4
   JohnsoncontrolsSnc16120-0 Version-
JohnsoncontrolsSnc16120-04 Firmware Version < 12.0.4
   JohnsoncontrolsSnc16120-04 Version-
JohnsoncontrolsF4-snc Firmware Version < 11.0.6
   JohnsoncontrolsF4-snc Version-
JohnsoncontrolsF4-snc Firmware Version >= 12.0.0 < 12.0.4
   JohnsoncontrolsF4-snc Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.17% 0.389
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
productsecurity@jci.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.