{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2025-53696","assignerOrgId":"12bdf821-1545-4a87-aac5-61670cc6fcef","state":"PUBLISHED","assignerShortName":"Dragos","dateReserved":"2025-07-08T14:48:42.604Z","datePublished":"2025-07-28T14:43:01.059Z","dateUpdated":"2025-08-19T14:43:13.549Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["Linux"],"product":"iSTAR Ultra","vendor":"Johnson Controls, Inc","versions":[{"lessThanOrEqual":"6.9.2","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"iSTAR Ultra performs a firmware verification on boot, however the verification does not inspect certain portions of the firmware. These firmware parts may contain malicious code. Tested up to firmware 6.9.2, later firmwares are also possibly affected.<br>"}],"value":"iSTAR Ultra performs a firmware verification on boot, however the verification does not inspect certain portions of the firmware. These firmware parts may contain malicious code. Tested up to firmware 6.9.2, later firmwares are also possibly affected."}],"impacts":[{"capecId":"CAPEC-638","descriptions":[{"lang":"en","value":"CAPEC-638 Altered Component Firmware"}]},{"capecId":"CAPEC-452","descriptions":[{"lang":"en","value":"CAPEC-452 Infected Hardware"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-494","description":"CWE-494 Download of Code Without Integrity Check","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"12bdf821-1545-4a87-aac5-61670cc6fcef","shortName":"Dragos","dateUpdated":"2025-08-19T14:43:13.549Z"},"references":[{"url":"https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/refs/heads/main/2025-03.txt"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-28T15:25:02.419648Z","id":"CVE-2025-53696","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-28T17:57:40.745Z"}}]},"dataVersion":"5.1"}