CVE-2025-26385 PUBLISHED

Metasys product command injection vulnerability could allow remote SQL execution

Assigner: jci
Reserved: 07.02.2025 Published: 30.01.2026 Updated: 30.01.2026

Johnson Controls Metasys component listed below have Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability . Successful exploitation of this vulnerability could allow remote SQL execution This issue affects 

  • Metasys: Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation, 
  • Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation, 
  • LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1, 
  • System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior, 
  • Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.5

Product Status

Vendor Johnson Controls
Product Metasys
Versions Default: unaffected
  • Version Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation is affected
  • Version Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation is affected
  • Version LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1 is affected
  • Version System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior is affected
  • Version Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior is affected

Solutions

a. Follow the Johnson Controls hardening guide steps to ensure your Metasys installation is on a segmented network, not exposed to untrusted networks such as the internet b. Download and execute the Metasys patch for GIV-165989 from the License Portal https://software.jci.com/licenseportal/ . Login credentials are required c. Close incoming TCP port 1433 d. For more detailed mitigation instructions, please see Johnson Controls Product Security Advisory JCI-PSA-2026-02 at the following location: https://www.johnsoncontrols.com/cyber-solutions/security-advisories

References

Problem Types

  • CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE

Impacts

  • CAPEC-248 Command Injection