search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Johnson Controls CK721-A and P2000 remote command execution vulnerability

Vulnerability Note VU#977312

Original Release Date: 2012-07-13 | Last Revised: 2013-04-03

Overview

Johnson Controls CK721-A and P2000 products contain a remote command execution vulnerability which may allow an unauthenticated remote attacker to perform various tasks against the devices.

Description

The "download" port (tcp/41014) on the CK721-A device is vulnerable to remote command execution. An unauthenticated attacker can send specially crafted packets to the port to instruct it to perform various tasks like unlocking a door, adding badges, or changing the configuration which could grant physical access to a secured area to the attacker without requiring valid credentials to the product.

The "upload" port (tcp/41013) P2000 (Pegasys) servers which is used for logging and alerting purposes is vulnerable to false alerts injections. The server accepts any messages sent to it with the only verification being the source IP address. An attacker can send specially crafted packets to the port that provides false access data to the server.

Impact

An unauthenticated attacker with network access to the CK721-A device can instruct it to perform various tasks like unlocking a door, adding badges, or changing the configuration which could grant physical access to a secured area. An unauthenticated attacker with network access to the P2000 (Pegasys) servers device can instruct it to log false alerts causing legitimate alerts to be harder to spot.

Solution

Update

The vendor has stated the following:

Vulnerability VU#977212 is addressed through the deployment of strong encryption, such as AES, for all IP based, bi-directional communications, on all ports, between CK-721 type controllers and the P2000 Security host server. The encryption methodology used by Johnson Controls Inc. supports the FIPS 140-2 standard, with reference validation certificates No. 1051 for controllers and No. 1336 for the server.

The process to implement encryption has four steps as follows:

Step 1Upgrade of the P2000 server security application software, to version P2000 V 3.11, P2K-SW-CORE 311. P/N 27-5618-3. Service Pack 3
Step 2Upgrade of the hardware module, of the CK-721 controller, to version CK-721A. P/N 27-5379-1044
Step 3Upgrade of the controller firmware, to current version. SSM4388_03.1.0.17_BB
Step 4Activation of encryption, as per the standard documentation. P/N 24-10618-147 Rev. A

The use of encryption is considered a security industry best practice, and is recommended at all times.

Additional information and support can be obtained by contacting JCI Customer Service, at 800-229-4076

Restrict Access

Implement appropriate firewall rules to block traffic from untrusted sources to TCP port 41013 and TCP port 41014.

Vendor Information

977312
Expand all

Johnson Controls

Updated:  June 07, 2012

Status

  Affected

Vendor Statement

Vulnerability VU-977212 is addressed through the deployment of strong encryption, such as AES, for all IP based, bi-directional communications, on all ports, between CK-721 type controllers and the P2000 Security host server. The encryption methodology used by Johnson Controls Inc. supports the FIPS 140-2 standard, with reference validation certificates No. 1051 for controllers and No. 1336 for the server.

The process to implement encryption has four steps as follows:
Step 1Upgrade of the P2000 server security application software, to version P2000 V 3.11, P2K-SW-CORE 311. P/N 27-5618-3.
Step 2Upgrade of the hardware module, of the CK-721 controller, to version CK-721A. P/N 27-5379-1044
Step 3Upgrade of the controller firmware, to current version. SSM4388_03.1.0.14_BB
Step 4Activation of encryption, as per the standard documentation. P/N 24-10618-147 Rev. A
The use of encryption is considered a security industry best practice, and is recommended at all times.
Additional information and support can be obtained by contacting JCI Customer Service, at 800-229-4076

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.8 E:POC/RL:W/RC:UC
Environmental 5.3 CDP:LM/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Travis Lee for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-2607
Date Public: 2012-07-13
Date First Published: 2012-07-13
Date Last Updated: 2013-04-03 19:27 UTC
Document Revision: 21

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.