Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21656: CWE-94 Improper Control of Generation of Code ('Code Injection') in Johnson Controls Frick Controls Quantum HD

0
High
VulnerabilityCVE-2026-21656cvecve-2026-21656cwe-94
Published: Fri Feb 27 2026 (02/27/2026, 08:47:21 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Frick Controls Quantum HD

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:36:14 UTC

Technical Analysis

CVE-2026-21656 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), specifically a code injection flaw in Johnson Controls Frick Controls Quantum HD devices, versions 10.22 and prior. The vulnerability stems from insufficient validation of input parameters, which allows attackers to inject malicious code that the device may execute. Notably, exploitation does not require any authentication, user interaction, or privileges, making it highly accessible to remote attackers. The vulnerability impacts the device's security before authentication, increasing the attack surface significantly. The affected product, Frick Controls Quantum HD, is a building management system component used for controlling HVAC and environmental systems in commercial and industrial facilities. The CVSS 4.0 base score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on integrity and availability. While no known exploits are reported in the wild yet, the potential for disruption or takeover of critical building infrastructure is significant. The lack of a patch at the time of reporting necessitates immediate risk mitigation through compensating controls. This vulnerability could allow attackers to execute arbitrary commands, alter system operations, or cause denial of service, severely impacting building operations and safety.

Potential Impact

The impact of CVE-2026-21656 is substantial for organizations relying on Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to unauthorized code execution, allowing attackers to manipulate building management functions such as HVAC controls, potentially causing physical environment disruptions, safety hazards, or operational downtime. The compromise of these systems could also serve as a foothold for lateral movement within enterprise networks, escalating risks to broader IT and OT infrastructure. Given the unauthenticated nature of the vulnerability, attackers can remotely exploit it without prior access, increasing the likelihood of attacks. The integrity and availability of critical building systems are at risk, which can affect occupant comfort, energy management, and emergency response systems. Organizations in sectors like commercial real estate, manufacturing, healthcare, and data centers are particularly vulnerable due to their reliance on such control systems. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing this vulnerability to prevent potential widespread impact.

Mitigation Recommendations

Until an official patch is released by Johnson Controls, organizations should implement several specific mitigations: 1) Isolate Frick Controls Quantum HD devices on dedicated network segments with strict access controls to limit exposure to untrusted networks. 2) Employ network intrusion detection/prevention systems (IDS/IPS) configured to monitor and block suspicious input patterns targeting the vulnerable parameters. 3) Restrict remote access to these devices using VPNs with multi-factor authentication and limit access to trusted personnel only. 4) Conduct thorough input validation and filtering at network boundaries to detect and block malformed or unexpected commands. 5) Monitor device logs and network traffic for anomalous activity indicative of exploitation attempts. 6) Engage with Johnson Controls support for early access to patches or workarounds and plan immediate deployment once available. 7) Maintain an up-to-date asset inventory to identify all affected devices and prioritize remediation efforts. 8) Educate operational technology (OT) and security teams about the vulnerability and response procedures to ensure rapid detection and containment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2026-01-02T13:23:28.169Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a15faf32ffcdb8a210677f

Added to database: 2/27/2026, 9:11:11 AM

Last enriched: 3/6/2026, 8:36:14 PM

Last updated: 4/13/2026, 8:09:55 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses