{"api_version":"1","generated_at":"2026-05-13T13:01:16+00:00","cve":"CVE-2022-21940","urls":{"html":"https://cve.report/CVE-2022-21940","api":"https://cve.report/api/cve/CVE-2022-21940.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-21940","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-21940"},"summary":{"title":"CVE-2022-21940","description":"Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.","state":"PUBLIC","assigner":"productsecurity@jci.com","published_at":"2023-02-09 21:15:00","updated_at":"2023-06-27 18:19:00"},"problem_types":["CWE-311"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03","refsource":"MISC","tags":[],"title":"Johnson Controls System Configuration Tool (SCT) | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories","name":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories","refsource":"MISC","tags":[],"title":"Product Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-21940","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21940","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"21940","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"johnsoncontrols","cpe5":"metasys_system_configuration_tool","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-21940","ASSIGNER":"productsecurity@jci.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute","cweId":"CWE-614"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Johnson Controls","product":{"product_data":[{"product_name":"System Configuration Tool (SCT)","version":{"version_data":[{"version_value":"14","version_affected":"="},{"version_value":"15","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories","refsource":"MISC","name":"https://www.johnsoncontrols.com/cyber-solutions/security-advisories"},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03","refsource":"MISC","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update SCT version 14 with patch 14.2.3"}],"value":"Update SCT version 14 with patch 14.2.3"},{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update SCT version 15 with patch 15.0.3<br>"}],"value":"Update SCT version 15 with patch 15.0.3\n"},{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS)."}],"value":"Contact your local Johnson Controls office or Authorized Building Control Specialists (ABCS)."}],"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-02-09 21:15:00","lastModifiedDate":"2023-06-27 18:19:00","problem_types":["CWE-311"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:johnsoncontrols:metasys_system_configuration_tool:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0","versionEndExcluding":"15.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:johnsoncontrols:metasys_system_configuration_tool:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.2.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"21940","Ordinal":"223075","Title":"CVE-2022-21940","CVE":"CVE-2022-21940","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"21940","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}