{"vuid":"VU#977312","idnumber":"977312","name":"Johnson Controls CK721-A and P2000 remote command execution vulnerability","keywords":["Johnson Controls","CK721-A","P2000","41014"],"overview":"Johnson Controls CK721-A and P2000 products contain a remote command execution vulnerability which may allow an unauthenticated remote attacker to perform various tasks against the devices.","clean_desc":"The \"download\" port (tcp/41014) on the CK721-A device is vulnerable to remote command execution. An unauthenticated attacker can send specially crafted packets to the port to instruct it to perform various tasks like unlocking a door, adding badges, or changing the configuration which could grant physical access to a secured area to the attacker without requiring valid credentials to the product. The \"upload\" port (tcp/41013) P2000 (Pegasys) servers which is used for logging and alerting purposes is vulnerable to false alerts injections. The server accepts any messages sent to it with the only verification being the source IP address. An attacker can send specially crafted packets to the port that provides false access data to the server.","impact":"An unauthenticated attacker with network access to the CK721-A device can instruct it to perform various tasks like unlocking a door, adding badges, or changing the configuration which could grant physical access to a secured area. An unauthenticated attacker with network access to the P2000 (Pegasys) servers device can instruct it to log false alerts causing legitimate alerts to be harder to spot.","resolution":"Update The vendor has stated the following: Vulnerability VU#977212 is addressed through the deployment of strong encryption, such as AES, for all IP based, bi-directional communications, on all ports, between CK-721 type controllers and the P2000 Security host server. The encryption methodology used by Johnson Controls Inc. supports the FIPS 140-2 standard, with reference validation certificates No. 1051 for controllers and No. 1336 for the server. The process to implement encryption has four steps as follows: Step 1\tUpgrade of the P2000 server security application software, to version P2000 V 3.11, P2K-SW-CORE 311. P/N 27-5618-3. Service Pack 3\nStep 2\tUpgrade of the hardware module, of the CK-721 controller, to version CK-721A. P/N 27-5379-1044\nStep 3\tUpgrade of the controller firmware, to current version. SSM4388_03.1.0.17_BB   \nStep 4\tActivation of encryption, as per the standard documentation. P/N 24-10618-147 Rev. A The use of encryption is considered a security industry best practice, and is recommended at all times. Additional information and support can be obtained by contacting JCI Customer Service, at 800-229-4076","workarounds":"Restrict Access Implement appropriate firewall rules to block traffic from untrusted sources to TCP port 41013 and TCP port 41014.","sysaffected":"","thanks":"Thanks to Travis Lee for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":[],"cveids":["CVE-2012-2607"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-05-30T13:49:47Z","publicdate":"2012-07-13T00:00:00Z","datefirstpublished":"2012-07-13T14:38:22Z","dateupdated":"2013-04-03T19:27:21Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.8","cvss_environmentalscore":"5.3","cvss_environmentalvector":"CDP:LM/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}