Johnson Controls Metasys component listed below have Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability . Successful exploitation of this vulnerability could allow remote SQL execution This issue affects 



* Metasys: Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation, 
* Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation, 
* LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1, 
* System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior, 
* Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior.
Advisories

No advisories yet.

Fixes

Solution

a. Follow the Johnson Controls hardening guide steps to ensure your Metasys installation is on a segmented network, not exposed to untrusted networks such as the internet b. Download and execute the Metasys patch for GIV-165989 from the License Portal https://software.jci.com/licenseportal/ . Login credentials are required c. Close incoming TCP port 1433 d. For more detailed mitigation instructions, please see Johnson Controls Product Security Advisory JCI-PSA-2026-02 at the following location: https://www.johnsoncontrols.com/cyber-solutions/security-advisories


Workaround

No workaround given by the vendor.

History

Fri, 30 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
Description Johnson Controls Metasys component listed below have Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability . Successful exploitation of this vulnerability could allow remote SQL execution This issue affects  * Metasys: Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation,  * Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation,  * LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1,  * System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior,  * Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior.
Title Metasys product command injection vulnerability could allow remote SQL execution
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2026-01-30T12:38:11.405Z

Reserved: 2025-02-07T14:15:53.880Z

Link: CVE-2025-26385

cve-icon Vulnrichment

Updated: 2026-01-30T12:38:06.619Z

cve-icon NVD

Status : Received

Published: 2026-01-30T11:15:53.467

Modified: 2026-01-30T11:15:53.467

Link: CVE-2025-26385

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses