Weak Pseudo-Random Number Generation in PowerG Software by Johnson Controls
CVE-2025-26379

7.2HIGH

Key Information:

Vendor
CVE Published:
22 December 2025

What is CVE-2025-26379?

A vulnerability exists in Johnson Controls' PowerG software due to the use of a weak pseudo-random number generator. This flaw could permit an attacker to read or inject encrypted PowerG packets, severely compromising the integrity and confidentiality of communications. Organizations should assess their systems for this vulnerability and implement necessary security measures to mitigate potential risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

IQ Panels2, 2+, IQHub, IQPanel 4, PowerG IQ Panels2 <= 2

IQ Panels2, 2+, IQHub, IQPanel 4, PowerG IQ Panel 2+ <= 2+

IQ Panels2, 2+, IQHub, IQPanel 4, PowerG IQHub

References

CVSS V4

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

James Chambersof NCC Group
and Sultan Qasim Khan NCC Group
.