Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg
Vendors & Products Johnsoncontrols
Johnsoncontrols iq Panels2
Johnsoncontrols iq Panels2+
Johnsoncontrols iqhub
Johnsoncontrols iqpanel 4
Johnsoncontrols powerg

Mon, 22 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
Description Under certain circumstances, attacker can capture the network key, read or write encrypted packets on the PowerG network.
Title Johnson Controls PowerG and IQPanel cleartext transmission of sensitive information
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published: 2025-12-22T10:07:19.789Z

Updated: 2025-12-22T14:09:49.340Z

Reserved: 2025-09-30T15:51:17.096Z

Link: CVE-2025-61738

cve-icon Vulnrichment

Updated: 2025-12-22T13:17:13.181Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-22T11:15:58.093

Modified: 2025-12-23T14:51:52.650

Link: CVE-2025-61738

cve-icon Redhat

No data.