Browse all 76 CVE security advisories affecting Johnson Controls. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Johnson Controls operates as a global leader in building technologies, providing integrated solutions for heating, ventilation, air conditioning, and security systems. With 76 recorded Common Vulnerabilities and Exposures (CVEs), the company’s software ecosystem has historically been susceptible to remote code execution, cross-site scripting, and privilege escalation flaws. These vulnerabilities often stem from legacy components within its building management platforms, exposing critical infrastructure to potential unauthorized access or data exfiltration. While no single catastrophic public breach has defined its recent history, the sheer volume of disclosed CVEs highlights systemic challenges in securing interconnected industrial control systems. Security researchers frequently identify these weaknesses as entry points for lateral movement within enterprise networks. Consequently, maintaining rigorous patch management and network segmentation remains essential for mitigating risks associated with Johnson Controls’ extensive hardware and software footprint in commercial and industrial environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-26385 | Metasys product command injection vulnerability could allow remote SQL execution — MetasysCWE-77 | 9.8AI | CriticalAI | 2026-01-30 |
| CVE-2021-36205 | Metasys session token — MetasysCWE-459 | 8.1 | High | 2022-04-15 |
| CVE-2021-36202 | Metasys UI — MetasysCWE-918 | 8.4 | High | 2022-04-07 |
| CVE-2021-27657 | Metasys Improper Privilege Management — MetasysCWE-269 | 8.8 | High | 2021-06-04 |
This page lists every published CVE security advisory associated with Johnson Controls. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.