Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.
Advisories

No advisories yet.

Fixes

Solution

a. Update IQ Panel 4’s to version 4.6.1/4.6.1i b. Devices that support PowerG+ should use PowerG v53.05 or later. c. During the installation or enrollment of PowerG+ devices, enter the PIN code in the PIN Code field on the sensor enrollment screen. For additional security, Johnson Controls recommends only authorized company personnel or integrators be present during the pairing process d. Replace all End-of-Life Products (IQ Panel 2, IQ Panel 2+, IQ Hub) with the latest IQ Panel 4 using firmware version 4.6.1 or greater


Workaround

No workaround given by the vendor.

History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg
Vendors & Products Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg

Mon, 22 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Due to Nonce reuse, attackers can perform reply attack or decrypt captured packets.
Title Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG reusing a nonce, key pair in encryption
Weaknesses CWE-323
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T13:09:17.628Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61739

cve-icon Vulnrichment

Updated: 2025-12-22T13:09:12.133Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-22T11:15:58.277

Modified: 2025-12-23T14:51:52.650

Link: CVE-2025-61739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:40:20Z

Weaknesses