Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21656: CWE-94 Improper Control of Generation of Code ('Code Injection') in Johnson Controls Frick Controls Quantum HD

0
High
VulnerabilityCVE-2026-21656cvecve-2026-21656cwe-94
Published: Fri Feb 27 2026 (02/27/2026, 08:47:21 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Frick Controls Quantum HD

Description

CVE-2026-21656 is a high-severity code injection vulnerability affecting Johnson Controls Frick Controls Quantum HD devices version 10. 22 and earlier. The flaw arises from improper validation of input parameters, allowing unauthenticated attackers to inject and execute arbitrary code on the device. Exploitation requires no user interaction or authentication, making it highly accessible to remote attackers. This vulnerability can severely impact device integrity and availability, potentially allowing attackers to take full control of the system. No known exploits are currently reported in the wild, but the risk remains significant given the device's role in critical building management systems. Organizations using affected versions should prioritize patching or mitigating this vulnerability promptly. The threat primarily affects countries with widespread deployment of Johnson Controls building management solutions, especially in North America, Europe, and parts of Asia. Due to the critical nature of building infrastructure control, the impact could extend to physical security and operational continuity. Immediate mitigation steps include network segmentation, input filtering, and monitoring for anomalous activity until patches are available.

AI-Powered Analysis

AILast updated: 02/27/2026, 09:26:01 UTC

Technical Analysis

CVE-2026-21656 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), specifically a code injection flaw in Johnson Controls Frick Controls Quantum HD devices, versions 10.22 and prior. The vulnerability stems from insufficient input validation in certain parameters, which allows attackers to inject malicious code that the device may execute. This issue is exploitable remotely without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the device, with a CVSS score of 8.8 (high severity). The affected product is typically used in building management and HVAC control systems, which are critical for operational infrastructure in commercial and industrial environments. Although no exploits have been reported in the wild yet, the potential for attackers to gain unauthorized control over these systems poses a significant risk. The lack of authentication barriers means attackers can leverage this vulnerability to execute arbitrary code, potentially disrupting building operations, compromising sensitive data, or facilitating further network intrusion. The vulnerability was publicly disclosed on February 27, 2026, with no patches currently available, emphasizing the urgency for affected organizations to implement interim mitigations.

Potential Impact

The impact of CVE-2026-21656 is substantial for organizations relying on Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to full compromise of the affected device, allowing attackers to execute arbitrary code, manipulate building management functions, disrupt HVAC and security controls, and potentially cause physical damage or safety hazards. This can result in operational downtime, financial losses, and reputational damage. Furthermore, compromised devices can serve as footholds for lateral movement within enterprise networks, increasing the risk of broader cyberattacks. The vulnerability affects critical infrastructure sectors such as commercial real estate, manufacturing, healthcare facilities, and data centers, where building automation systems are integral to daily operations. Given the unauthenticated and remote exploitability, the threat surface is large, and attackers can act stealthily without alerting administrators. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

Organizations should immediately assess their deployment of Frick Controls Quantum HD devices and identify any running version 10.22 or earlier. Until official patches are released, implement strict network segmentation to isolate these devices from untrusted networks and limit access to management interfaces. Deploy web application firewalls or intrusion prevention systems with custom rules to detect and block suspicious input patterns indicative of code injection attempts. Enable detailed logging and continuous monitoring for unusual commands or behavior on these devices. Restrict access to the devices using VPNs or secure tunnels with strong authentication where possible. Engage with Johnson Controls support channels to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for personnel managing these systems to recognize signs of compromise. Consider deploying endpoint detection and response (EDR) solutions on connected management workstations to detect lateral movement attempts. Finally, review and harden device configurations to minimize attack surface exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2026-01-02T13:23:28.169Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a15faf32ffcdb8a210677f

Added to database: 2/27/2026, 9:11:11 AM

Last enriched: 2/27/2026, 9:26:01 AM

Last updated: 2/27/2026, 11:32:15 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses