Successful exploitation of this vulnerability may allow replay attacks.
Johnson Controls reports this vulnerability affects the following versions of KT-1 door controllers:
The KT-1 door controller is susceptible to replay attacks.
CVE-2021-27662 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
Dr. Dave Burke, Anthony Connor, and Harrison Spisak reported this vulnerability to Johnson Controls, Inc.
Johnson Controls recommends users upgrade the KT-1 controller to Version 3.04 and upgrade EntraPass to Version 8.40
For more detailed mitigation instructions, please see Johnson Controls Product Security Advisory JCI-PSA-2021-14
Johnson Controls recommends taking steps to deploy recommend practices to minimize risks to all building automation systems.
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability.
Contact Information
For any questions related to this report, please contact the CISA at:
Email: [email protected]
Toll Free: 1-888-282-0870
For industrial control systems cybersecurity information: https://us-cert.cisa.gov/ics
or incident reporting: https://us-cert.cisa.gov/report
CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.
This product is provided subject to this Notification and this Privacy & Use policy.
Please share your thoughts.
We recently updated our anonymous product survey; we’d welcome your feedback.
twitter.com/icscert
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27662
www.addthis.com/bookmark.php?url=https%3A%2F%2Fus-cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-21-257-02-0
cwe.mitre.org/data/definitions/294.html
twitter.com/share?url=https%3A%2F%2Fus-cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-21-257-02-0
us-cert.cisa.gov/ics
us-cert.cisa.gov/ics
us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01
us-cert.cisa.gov/ics/recommended-practices
us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B
us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
www.cisa.gov
www.cisa.gov
www.cisa.gov/uscert
www.dhs.gov
www.dhs.gov/
www.dhs.gov/freedom-information-act-foia
www.dhs.gov/homeland-security-no-fear-act-reporting
www.dhs.gov/plain-writing-dhs
www.dhs.gov/plug-information
www.dhs.gov/privacy-policy
www.facebook.com/sharer.php?u=https%3A%2F%2Fus-cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-21-257-02-0
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
www.johnsoncontrols.com/cyber-solutions/security-advisories
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://us-cert.cisa.gov/ics/advisories/icsa-21-257-02-0
www.usa.gov/
www.whitehouse.gov/