Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-21934 : Exploit Details and Defense Strategies

Learn about CVE-2022-21934 impacting Johnson Controls' Metasys servers. Update affected versions to prevent unauthorized account access.

A detailed overview of CVE-2022-21934 impacting Johnson Controls' Metasys ADS/ADX/OAS servers.

Understanding CVE-2022-21934

This CVE involves a vulnerability in Metasys ADS/ADX/OAS servers that could allow an authenticated user to lock other users out of the system or take over their accounts.

What is CVE-2022-21934?

Under specific circumstances, authenticated users in Metasys ADS/ADX/OAS server versions prior to 10.1.5 and 11.0.2 may exploit this vulnerability.

The Impact of CVE-2022-21934

The vulnerability poses a high risk, with a CVSS base score of 8.0, high confidentiality, integrity, and availability impact, affecting all 10 and 11 versions of the servers.

Technical Details of CVE-2022-21934

This section outlines the vulnerability description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The vulnerability allows authenticated users to lock others out of the system or take over their accounts.

Affected Systems and Versions

All 10 versions of Metasys ADS/ADX/OAS server are affected prior to 10.1.5, as well as all 11 versions prior to 11.0.2.

Exploitation Mechanism

Under certain circumstances, attackers can exploit this vulnerability to manipulate user accounts.

Mitigation and Prevention

Discover the necessary steps to secure your systems against CVE-2022-21934.

Immediate Steps to Take

Update all Metasys ADS/ADX/OAS 10 versions with patch 10.1.5 and all 11 versions with patch 11.0.2 to mitigate the vulnerability.

Long-Term Security Practices

Regularly monitor and update your systems to prevent future security threats.

Patching and Updates

Stay informed about security advisories and promptly apply patches to protect your systems from potential risks.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now