Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Johnson Controls Frick Controls Quantum HD

0
High
VulnerabilityCVE-2026-21658cvecve-2026-21658cwe-94
Published: Fri Feb 27 2026 (02/27/2026, 08:59:13 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Frick Controls Quantum HD

Description

Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.

AI-Powered Analysis

AILast updated: 02/27/2026, 09:25:33 UTC

Technical Analysis

CVE-2026-21658 identifies a critical security vulnerability classified under CWE-94 (Improper Control of Generation of Code) in Johnson Controls Frick Controls Quantum HD, a building management system product widely used for HVAC and environmental control. The vulnerability exists in versions 10.22 and prior and allows unauthenticated remote attackers to perform code injection, leading to remote code execution (RCE). The flaw arises because the product improperly controls the generation and execution of code, enabling attackers to inject malicious payloads without requiring any authentication or user interaction. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and availability. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable, posing a significant risk to affected organizations. The lack of available patches at the time of reporting increases the urgency for mitigations. This vulnerability threatens the integrity and availability of critical building management infrastructure, potentially allowing attackers to disrupt operations, exfiltrate sensitive data, or pivot into broader enterprise networks.

Potential Impact

The impact of CVE-2026-21658 is substantial for organizations using Johnson Controls Frick Controls Quantum HD systems. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and environmental systems, causing operational disruptions, safety hazards, and potential physical damage. Confidentiality breaches may expose sensitive operational data or credentials. Integrity violations could allow attackers to manipulate system settings or logs, masking their activities or causing malfunctions. Availability impacts include denial of service or system outages, which can affect critical infrastructure such as data centers, hospitals, manufacturing plants, and commercial buildings. The vulnerability's network-exploitable nature means attackers can launch attacks remotely, increasing the risk of widespread impact. Organizations may face regulatory, financial, and reputational consequences if exploited, especially those in sectors where building management systems are integral to safety and compliance.

Mitigation Recommendations

To mitigate CVE-2026-21658, organizations should immediately assess their deployment of Frick Controls Quantum HD and identify affected versions (10.22 and prior). Since no official patches are currently available, implement network segmentation to isolate these systems from untrusted networks and limit access to trusted administrators only. Deploy strict firewall rules to restrict inbound traffic to the minimum necessary and monitor network traffic for unusual activity targeting these devices. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect code injection attempts. Regularly audit and harden device configurations, disabling unnecessary services and interfaces. Establish robust logging and alerting to detect potential exploitation attempts early. Engage with Johnson Controls for updates on patch availability and apply them promptly once released. Additionally, consider deploying application-layer gateways or proxies that can sanitize or block malicious payloads targeting the vulnerable code paths. Conduct employee training to raise awareness about the risks and ensure incident response plans include scenarios involving building management system compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2026-01-02T13:23:28.169Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a15faf32ffcdb8a2106787

Added to database: 2/27/2026, 9:11:11 AM

Last enriched: 2/27/2026, 9:25:33 AM

Last updated: 2/27/2026, 11:35:14 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses