Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.
History

Mon, 22 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Use of a weak pseudo-random number generator, which may allow an attacker to read or inject encrypted PowerG packets.
Title Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG use of Cryptographically Weak Pseudo-Random Number Generator
Weaknesses CWE-338
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jci

Published:

Updated: 2025-12-22T16:19:25.130Z

Reserved: 2025-02-07T14:15:53.879Z

Link: CVE-2025-26379

cve-icon Vulnrichment

Updated: 2025-12-22T16:19:19.954Z

cve-icon NVD

Status : Received

Published: 2025-12-22T15:16:00.070

Modified: 2025-12-22T15:16:00.070

Link: CVE-2025-26379

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.