Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21654: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Johnson Controls Frick Controls Quantum HD

0
High
VulnerabilityCVE-2026-21654cvecve-2026-21654cwe-78
Published: Fri Feb 27 2026 (02/27/2026, 08:38:42 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Frick Controls Quantum HD

Description

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:36:02 UTC

Technical Analysis

CVE-2026-21654 is an OS Command Injection vulnerability classified under CWE-78, found in Johnson Controls Frick Controls Quantum HD software versions 10.22 and prior. The vulnerability stems from insufficient input validation and improper neutralization of special characters in certain parameters processed by the device. This flaw allows attackers to inject and execute arbitrary OS commands remotely without requiring authentication or user interaction. The vulnerability affects the core control software used in building management systems, which are critical for HVAC and other environmental controls in commercial and industrial facilities. The CVSS 4.0 base score of 8.8 reflects the vulnerability's high impact and ease of exploitation, with no privileges or user interaction needed. Exploiting this vulnerability could lead to unauthorized control over the device, enabling attackers to disrupt operations, exfiltrate sensitive information, or pivot to other networked systems. Although no public exploits have been reported yet, the exposure of such a critical infrastructure component makes this vulnerability a significant security concern. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to protect affected environments.

Potential Impact

The potential impact of CVE-2026-21654 is severe for organizations relying on Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to full compromise of the affected device, allowing attackers to execute arbitrary commands at the OS level. This can result in disruption of building management functions such as HVAC controls, potentially causing physical environment instability, safety hazards, and operational downtime. Confidentiality may be breached if attackers access sensitive configuration or operational data. Integrity of system operations can be undermined, leading to unauthorized changes or sabotage. Availability is at risk due to possible denial of service or device malfunction. Given the critical role these systems play in facility management, the vulnerability could have cascading effects on business continuity, occupant safety, and regulatory compliance. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments with exposed or poorly segmented networks.

Mitigation Recommendations

1. Immediately assess and inventory all Frick Controls Quantum HD devices running version 10.22 or earlier. 2. Apply vendor patches or updates as soon as they become available; monitor Johnson Controls advisories closely. 3. If patches are not yet released, implement network segmentation to isolate affected devices from untrusted networks and limit access to trusted administrators only. 4. Employ strict input validation and filtering at network boundaries to detect and block suspicious command injection attempts targeting these devices. 5. Monitor device logs and network traffic for unusual command execution patterns or unauthorized access attempts. 6. Disable or restrict remote management interfaces if not required, or enforce strong authentication and encryption. 7. Conduct regular security audits and penetration testing focused on building management systems to identify and remediate similar vulnerabilities. 8. Develop and test incident response plans specific to building management system compromises to minimize operational impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2026-01-02T13:23:28.169Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a158a732ffcdb8a20b09cb

Added to database: 2/27/2026, 8:41:11 AM

Last enriched: 3/6/2026, 8:36:02 PM

Last updated: 4/13/2026, 7:21:39 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses