CVE-2026-21658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Johnson Controls Frick Controls Quantum HD
Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.
AI Analysis
Technical Summary
CVE-2026-21658 identifies a critical security vulnerability classified under CWE-94 (Improper Control of Generation of Code) in Johnson Controls Frick Controls Quantum HD, a building management system product widely used for HVAC and environmental control. The vulnerability exists in versions 10.22 and prior and allows unauthenticated remote attackers to perform code injection, leading to remote code execution (RCE). The flaw arises because the product improperly controls the generation and execution of code, enabling attackers to inject malicious payloads without requiring any authentication or user interaction. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and availability. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable, posing a significant risk to affected organizations. The lack of available patches at the time of reporting increases the urgency for mitigations. This vulnerability threatens the integrity and availability of critical building management infrastructure, potentially allowing attackers to disrupt operations, exfiltrate sensitive data, or pivot into broader enterprise networks.
Potential Impact
The impact of CVE-2026-21658 is substantial for organizations using Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and environmental systems, causing operational disruptions, safety hazards, and potential physical damage. Confidentiality breaches may expose sensitive operational data or credentials. Integrity violations could allow attackers to manipulate system settings or logs, masking their activities or causing malfunctions. Availability impacts include denial of service or system outages, which can affect critical infrastructure such as data centers, hospitals, manufacturing plants, and commercial buildings. The vulnerability's network-exploitable nature means attackers can launch attacks remotely, increasing the risk of widespread impact. Organizations may face regulatory, financial, and reputational consequences if exploited, especially those in sectors where building management systems are integral to safety and compliance.
Mitigation Recommendations
To mitigate CVE-2026-21658, organizations should immediately assess their deployment of Frick Controls Quantum HD and identify affected versions (10.22 and prior). Since no official patches are currently available, implement network segmentation to isolate these systems from untrusted networks and limit access to trusted administrators only. Deploy strict firewall rules to restrict inbound traffic to the minimum necessary and monitor network traffic for unusual activity targeting these devices. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect code injection attempts. Regularly audit and harden device configurations, disabling unnecessary services and interfaces. Establish robust logging and alerting to detect potential exploitation attempts early. Engage with Johnson Controls for updates on patch availability and apply them promptly once released. Additionally, consider deploying application-layer gateways or proxies that can sanitize or block malicious payloads targeting the vulnerable code paths. Conduct employee training to raise awareness about the risks and ensure incident response plans include scenarios involving building management system compromises.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, United Arab Emirates, Singapore
CVE-2026-21658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Johnson Controls Frick Controls Quantum HD
Description
Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2026-21658 identifies a critical security vulnerability classified under CWE-94 (Improper Control of Generation of Code) in Johnson Controls Frick Controls Quantum HD, a building management system product widely used for HVAC and environmental control. The vulnerability exists in versions 10.22 and prior and allows unauthenticated remote attackers to perform code injection, leading to remote code execution (RCE). The flaw arises because the product improperly controls the generation and execution of code, enabling attackers to inject malicious payloads without requiring any authentication or user interaction. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and availability. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable, posing a significant risk to affected organizations. The lack of available patches at the time of reporting increases the urgency for mitigations. This vulnerability threatens the integrity and availability of critical building management infrastructure, potentially allowing attackers to disrupt operations, exfiltrate sensitive data, or pivot into broader enterprise networks.
Potential Impact
The impact of CVE-2026-21658 is substantial for organizations using Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and environmental systems, causing operational disruptions, safety hazards, and potential physical damage. Confidentiality breaches may expose sensitive operational data or credentials. Integrity violations could allow attackers to manipulate system settings or logs, masking their activities or causing malfunctions. Availability impacts include denial of service or system outages, which can affect critical infrastructure such as data centers, hospitals, manufacturing plants, and commercial buildings. The vulnerability's network-exploitable nature means attackers can launch attacks remotely, increasing the risk of widespread impact. Organizations may face regulatory, financial, and reputational consequences if exploited, especially those in sectors where building management systems are integral to safety and compliance.
Mitigation Recommendations
To mitigate CVE-2026-21658, organizations should immediately assess their deployment of Frick Controls Quantum HD and identify affected versions (10.22 and prior). Since no official patches are currently available, implement network segmentation to isolate these systems from untrusted networks and limit access to trusted administrators only. Deploy strict firewall rules to restrict inbound traffic to the minimum necessary and monitor network traffic for unusual activity targeting these devices. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect code injection attempts. Regularly audit and harden device configurations, disabling unnecessary services and interfaces. Establish robust logging and alerting to detect potential exploitation attempts early. Engage with Johnson Controls for updates on patch availability and apply them promptly once released. Additionally, consider deploying application-layer gateways or proxies that can sanitize or block malicious payloads targeting the vulnerable code paths. Conduct employee training to raise awareness about the risks and ensure incident response plans include scenarios involving building management system compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2026-01-02T13:23:28.169Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a15faf32ffcdb8a2106787
Added to database: 2/27/2026, 9:11:11 AM
Last enriched: 2/27/2026, 9:25:33 AM
Last updated: 2/27/2026, 11:35:14 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1434: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Politechnika Warszawska Omega-PSIR
MediumCVE-2026-1305: CWE-287 Improper Authentication in shoheitanaka Japanized for WooCommerce
MediumCVE-2025-14142: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electriccode Electric Enquiries
MediumCVE-2024-10938: CWE-506 Embedded Malicious Code in moneytigo OVRI Payment
MediumCVE-2026-21660: CWE-256: Plaintext Storage of a Password in Johnson Controls Frick Controls Quantum HD
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.