Home

Description

Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.

PUBLISHED Reserved 2025-02-07 | Published 2025-12-22 | Updated 2025-12-22 | Assigner jci




HIGH: 7.2CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N

Problem types

CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

Default status
unaffected

IQ Panels2 (custom)
affected

IQ Panel 2+ (custom)
affected

IQHub (custom)
affected

IQPanel 4 (custom)
affected

PowerG (custom)
affected

Credits

James Chambersof NCC Group finder

and Sultan Qasim Khan NCC Group finder

References

www.johnsoncontrols.com/...cybersecurity/security-advisories

www.cisa.gov/news-events/ics-advisories/icsa-25-350-02

cve.org (CVE-2025-26379)

nvd.nist.gov (CVE-2025-26379)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.