CVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD
Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.
AI Analysis
Technical Summary
CVE-2026-21659 is a vulnerability classified under CWE-23 (Relative Path Traversal) affecting Johnson Controls Frick Controls Quantum HD, specifically versions 10.22 and earlier. The flaw allows an unauthenticated attacker to exploit a Local File Inclusion (LFI) vulnerability, which can be leveraged to execute arbitrary code remotely on the affected device. This occurs because the product improperly sanitizes user-supplied input used in file path operations, enabling attackers to traverse directories and include unintended files. The consequence is a full system compromise, as attackers gain the ability to run arbitrary commands with the privileges of the affected service. The vulnerability does not require any authentication or user interaction, increasing its severity and ease of exploitation. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality. The affected product, Frick Controls Quantum HD, is a building management system component used in HVAC and environmental controls, making it a critical asset in many commercial and industrial environments. No patches or known exploits have been publicly disclosed yet, but the potential for exploitation is significant given the nature of the vulnerability. The vulnerability was reserved in early 2026 and published in February 2026, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2026-21659 is severe for organizations relying on Johnson Controls Frick Controls Quantum HD systems. Successful exploitation results in full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can lead to unauthorized control over building management systems, disruption of HVAC and environmental controls, potential physical safety hazards, and exposure of sensitive operational data. The compromise of such critical infrastructure components can cause operational downtime, financial losses, reputational damage, and regulatory compliance issues. Additionally, attackers could use compromised devices as pivot points to infiltrate broader enterprise networks, escalating the scope of impact. Given the critical role of these systems in commercial buildings, data centers, hospitals, and industrial facilities, the threat extends to public safety and national security. The lack of known exploits in the wild currently provides a window for mitigation, but the ease of exploitation and unauthenticated access requirement make rapid response essential.
Mitigation Recommendations
To mitigate CVE-2026-21659, organizations should first verify if they are running affected versions (10.22 or earlier) of Frick Controls Quantum HD and prioritize upgrading to a patched version once available from Johnson Controls. In the absence of an official patch, implement network segmentation to isolate affected devices from untrusted networks and restrict access to management interfaces using firewalls and access control lists. Employ strict network monitoring and intrusion detection systems to identify anomalous activities indicative of exploitation attempts. Disable or limit unnecessary services and interfaces on the affected devices to reduce the attack surface. Apply application-layer filtering to sanitize inputs if possible through configuration changes or web application firewalls. Conduct regular security audits and vulnerability assessments on building management systems. Coordinate with Johnson Controls support for any available workarounds or interim fixes. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment and recovery.
Affected Countries
United States, Canada, Germany, United Kingdom, France, Australia, Japan, South Korea, United Arab Emirates, Singapore
CVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD
Description
Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-21659 is a vulnerability classified under CWE-23 (Relative Path Traversal) affecting Johnson Controls Frick Controls Quantum HD, specifically versions 10.22 and earlier. The flaw allows an unauthenticated attacker to exploit a Local File Inclusion (LFI) vulnerability, which can be leveraged to execute arbitrary code remotely on the affected device. This occurs because the product improperly sanitizes user-supplied input used in file path operations, enabling attackers to traverse directories and include unintended files. The consequence is a full system compromise, as attackers gain the ability to run arbitrary commands with the privileges of the affected service. The vulnerability does not require any authentication or user interaction, increasing its severity and ease of exploitation. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality. The affected product, Frick Controls Quantum HD, is a building management system component used in HVAC and environmental controls, making it a critical asset in many commercial and industrial environments. No patches or known exploits have been publicly disclosed yet, but the potential for exploitation is significant given the nature of the vulnerability. The vulnerability was reserved in early 2026 and published in February 2026, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2026-21659 is severe for organizations relying on Johnson Controls Frick Controls Quantum HD systems. Successful exploitation results in full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can lead to unauthorized control over building management systems, disruption of HVAC and environmental controls, potential physical safety hazards, and exposure of sensitive operational data. The compromise of such critical infrastructure components can cause operational downtime, financial losses, reputational damage, and regulatory compliance issues. Additionally, attackers could use compromised devices as pivot points to infiltrate broader enterprise networks, escalating the scope of impact. Given the critical role of these systems in commercial buildings, data centers, hospitals, and industrial facilities, the threat extends to public safety and national security. The lack of known exploits in the wild currently provides a window for mitigation, but the ease of exploitation and unauthenticated access requirement make rapid response essential.
Mitigation Recommendations
To mitigate CVE-2026-21659, organizations should first verify if they are running affected versions (10.22 or earlier) of Frick Controls Quantum HD and prioritize upgrading to a patched version once available from Johnson Controls. In the absence of an official patch, implement network segmentation to isolate affected devices from untrusted networks and restrict access to management interfaces using firewalls and access control lists. Employ strict network monitoring and intrusion detection systems to identify anomalous activities indicative of exploitation attempts. Disable or limit unnecessary services and interfaces on the affected devices to reduce the attack surface. Apply application-layer filtering to sanitize inputs if possible through configuration changes or web application firewalls. Conduct regular security audits and vulnerability assessments on building management systems. Coordinate with Johnson Controls support for any available workarounds or interim fixes. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment and recovery.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2026-01-02T13:23:28.169Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1633532ffcdb8a2131e50
Added to database: 2/27/2026, 9:26:13 AM
Last enriched: 3/6/2026, 8:38:10 PM
Last updated: 4/13/2026, 12:26:33 PM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.