Johnson Controls has issued an advisory regarding a significant vulnerability in their Illustra Essentials Gen 4 IP cameras, identified under Alert Code ICSA-24-179-06. This vulnerability, with a CVSS v3 base score of 6.8, involves the insertion of sensitive information into log files, potentially exposing Linux user credentials. The issue affects all versions up to Illustra.Ess4.01.02.10.5982, and can be exploited remotely with low attack complexity.
The vulnerability, classified as CWE-532, results from the system logging unnecessary user details, which could be leveraged by an attacker to gain unauthorized access. The exposure of such sensitive information in log files increases the risk of unauthorized credential access and potential security breaches. This flaw has been assigned CVE-2024-32757, highlighting its critical nature and the need for prompt action.
In response to the identified risk, Johnson Controls recommends upgrading to version Illustra.Ess4.01.02.13.6953 to mitigate the vulnerability. Additionally, they provide a detailed security advisory (JCI-PSA-2024-10 v1) for further guidance. For comprehensive protection, Johnson Controls advises on minimizing network exposure, implementing robust firewall protections, and using secure remote access methods such as VPNs.
CISA also urges organizations to adopt defensive measures to reduce the risk of exploitation. This includes not only updating to the latest security patches but also following best practices for network and control system security. Organizations are encouraged to consult CISA’s resources on industrial control systems cybersecurity and to report any suspicious activity to CISA for further investigation and correlation with other incidents.