Under certain circumstances a successful exploitation could result in access to the device.
History

Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Johnsoncontrols
Johnsoncontrols istar Edge G2
Johnsoncontrols istar Ultra
Johnsoncontrols istar Ultra G2
Johnsoncontrols istar Ultra G2 Se
Johnsoncontrols istar Ultra Se
Vendors & Products Johnsoncontrols
Johnsoncontrols istar Edge G2
Johnsoncontrols istar Ultra
Johnsoncontrols istar Ultra G2
Johnsoncontrols istar Ultra G2 Se
Johnsoncontrols istar Ultra Se

Wed, 24 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description Under certain circumstances a successful exploitation could result in access to the device.
Title iSTAR Ultra, Ultra SE, Ultra G2, Ultra G2 SE, iSTAR Edge G2 - Authenticated web application command injection - get8021xSettings
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published: 2025-12-24T15:27:06.898Z

Updated: 2025-12-24T16:20:55.776Z

Reserved: 2025-04-17T20:07:25.122Z

Link: CVE-2025-43876

cve-icon Vulnrichment

Updated: 2025-12-24T16:20:43.329Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-24T16:15:48.227

Modified: 2025-12-29T15:58:13.147

Link: CVE-2025-43876

cve-icon Redhat

No data.