2026 Futuriom 50: Highlights →Explore

Executive Summary

In December 2025, security researchers at NCC Group identified and responsibly disclosed four cryptographic vulnerabilities (CVE-2025-61738, CVE-2025-61739, CVE-2025-26379, CVE-2025-61740) impacting Johnson Controls’ PowerG, IQPanel, and IQHub products. The flaws included cleartext transmission of sensitive information, nonce reuse, weak pseudo-random number generation, and inadequate origin validation. Threat actors could exploit these issues to intercept, decrypt, or manipulate encrypted wireless traffic, potentially altering system behavior or disrupting services in commercial facilities globally. Johnson Controls issued advisories and firmware updates, especially urging customers to migrate to IQPanel 4 with firmware 4.6.1 or later.

The incident highlights the continued importance of secure-by-design principles in IoT and OT devices, as attacks increasingly pivot toward embedded and building automation systems. Heightened regulatory focus and attacker sophistication underscore the need for proactive vulnerability management and segmenting critical infrastructure networks.

Why This Matters Now

This breach highlights urgent risks for building automation and IoT environments relying on wireless proprietary protocols. With threat actors increasingly targeting operational technology, rapid remediation and improved cryptographic practices are essential for mitigating new attack vectors affecting critical infrastructure and global commercial facilities.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Researchers found four vulnerabilities, including cleartext transmission of sensitive data, reused nonces, weak pseudo-random number generators, and inadequate origin validation, potentially enabling traffic interception and manipulation.

Cloud Native Security Fabric Mitigations and ControlsCNSF

CNSF controls such as Zero Trust Segmentation, inline encrypted traffic enforcement, east-west traffic security, and threat detection could have segmented vulnerable devices, prevented packet tampering, detected anomalies, and blocked unauthorized east-west and outbound traffic — thereby constraining the attack at multiple stages.

Initial Compromise

Control: Encrypted Traffic (HPE)

Mitigation: Prevents interception and manipulation of data in transit.

Privilege Escalation

Control: Inline IPS (Suricata)

Mitigation: Detects and blocks replay or signature-based exploit attempts.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Limits lateral traversal and device-to-device abuse.

Command & Control

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Detects and blocks unauthorized command channels in real time.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Prevents exfiltration of sensitive data to external or unauthorized destinations.

Impact (Mitigations)

Limits blast radius and restricts unauthorized commands to only impacted devices.

Impact at a Glance

Affected Business Functions

  • Security Monitoring
  • Access Control
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of sensitive security configurations and unauthorized access to control systems.

Recommended Actions

  • Mandate line-rate encrypted traffic (MACsec/IPsec) between all IoT/OT devices to prevent sensitive information exposure in transit.
  • Deploy east-west microsegmentation and identity-based controls to isolate IoT/OT assets and block lateral movement.
  • Integrate inline IPS and real-time anomaly detection to identify and halt replay, injection, or protocol manipulation attempts.
  • Enforce granular egress security policies to block unauthorized outbound data flows and detect exfiltration channels.
  • Regularly update cryptographic protocols on all devices, monitor for anomalous behaviors, and restrict access during sensitive provisioning events.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image