CVE-2020-9049

victor Web Client and C•CURE Web Client JSON Web Token (JWT) Vulnerability

Description

A vulnerability in specified versions of American Dynamics victor Web Client and Software House C•CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.

Remediation

Solution:

  • victor Web Client • victor Web Client v5.6 and earlier – upgrade to v5.6 SP1 (victor Unified Client v5.6 SP1) Registered users can obtain the software update by downloading the update found here: https://www.americandynamics.net/support/SoftwareDownloads.aspx. C•CURE Web Client C•CURE Web v2.60 and earlier - upgrade to a minimum of v2.70 and install the relevant update below. • C•CURE Web v2.70 - install the update WebClient_c2.70_5.2_Update02 • C•CURE Web v2.80 - install the update WebClient_c2.80_v5.4.1_Update04 • C•CURE Web v2.90 - install the update CCureWeb_2.90_Update01 Registered users can obtain the software update by downloading the update found here: https://swhouse.com/Support/SoftwareDownloads.aspx.

Categories

7.1
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.06%
Vendor Advisory johnsoncontrols.com
Affected: Johnson Controls victor Web Client version 5.6 and prior
Affected: Johnson Controls C•CURE Web Client version 2.90 and prior (Note - This does not affect the new web-based C•CURE 9000 client that was introduced in C•CURE 9000 v2.90)
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-9049?
CVE-2020-9049 has been scored as a high severity vulnerability.
How to fix CVE-2020-9049?
To fix CVE-2020-9049: victor Web Client • victor Web Client v5.6 and earlier – upgrade to v5.6 SP1 (victor Unified Client v5.6 SP1) Registered users can obtain the software update by downloading the update found here: https://www.americandynamics.net/support/SoftwareDownloads.aspx. C•CURE Web Client C•CURE Web v2.60 and earlier - upgrade to a minimum of v2.70 and install the relevant update below. • C•CURE Web v2.70 - install the update WebClient_c2.70_5.2_Update02 • C•CURE Web v2.80 - install the update WebClient_c2.80_v5.4.1_Update04 • C•CURE Web v2.90 - install the update CCureWeb_2.90_Update01 Registered users can obtain the software update by downloading the update found here: https://swhouse.com/Support/SoftwareDownloads.aspx.
Is CVE-2020-9049 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-9049 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-9049?
CVE-2020-9049 affects Johnson Controls victor Web Client version 5.6 and prior, Johnson Controls C•CURE Web Client version 2.90 and prior (Note - This does not affect the new web-based C•CURE 9000 client that was introduced in C•CURE 9000 v2.90).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.