Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Posted on February 1, 2026February 1, 2026 By CWS

A important advisory addressing a extreme SQL injection vulnerability affecting a number of Johnson Controls industrial management system merchandise.

The vulnerability, tracked as CVE-2025-26385, carries a most CVSS v3 severity rating of 10.0, indicating the best stage of danger to affected infrastructure.

The flaw stems from improper neutralization of particular components utilized in command injection, permitting distant attackers to execute arbitrary SQL instructions with out authentication.

Profitable exploitation permits attackers to change, delete, or exfiltrate delicate information from affected techniques.

The vulnerability impacts six Johnson Controls merchandise used throughout important infrastructure sectors worldwide. Johnson Controls merchandise are deployed throughout a number of important infrastructure sectors.

Together with industrial services, important manufacturing, power era, authorities operations, and transportation techniques.

The corporate, headquartered in Eire, maintains a world presence, making this vulnerability a widespread concern.

CISA recommends organizations implement the next defensive measures to reduce exploitation danger.

Management system networks should be remoted from web publicity and positioned behind firewalls, separated from enterprise community infrastructure.

Affected Merchandise and Scope

The vulnerability impacts the next Johnson Controls functions:

ProductCVE IdentifierApplication and Information Server (ADS)CVE-2025-26385Extended Software and Information Server (ADX)CVE-2025-26385LCS8500CVE-2025-26385NAE8500CVE-2025-26385System Configuration Device (SCT)CVE-2025-26385Controller Configuration Device (CCT)CVE-2025-26385

Organizations requiring distant entry ought to deploy Digital Non-public Networks (VPNs) with present safety patches, recognizing that VPN safety is dependent upon the integrity of the related units.

Community segmentation and air-gapping characterize important protecting methods for legacy techniques unable to obtain quick patches.

CISA has not documented any recognized public exploitation of this vulnerability as of the advisory launch date of January 27, 2026.

Nevertheless, the important severity score and widespread deployment warrant quick consideration from system directors and safety groups.

The advisory, designated ICSA-26-027-04, represents a republication of Johnson Controls’ preliminary safety advisory JCI-PSA-2026-02.

Organizations observing suspicious exercise ought to report findings to CISA for correlation with different reported incidents and complete menace monitoring.

Johnson Controls reported the vulnerability to CISA, enabling coordinated disclosure and permitting safety groups ample preparation time earlier than potential exploitation makes an attempt.

Organizations ought to prioritize influence evaluation and danger evaluation earlier than deploying defensive measures to keep away from operational disruption.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, Controls, Critical, Enables, Injection, Johnson, Products, Remote, SQL, Vulnerabilities

Post navigation

Previous Post: Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
Next Post: State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

Related Posts

Flickr Security Breach Exposes User Data Flickr Security Breach Exposes User Data Cyber Security News
Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Cyber Security News
AuraStealer Malware Emerges with Expanding C2 Network AuraStealer Malware Emerges with Expanding C2 Network Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
20 Best Endpoint Management Tools 20 Best Endpoint Management Tools Cyber Security News
Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark