Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD

0
High
VulnerabilityCVE-2026-21659cvecve-2026-21659cwe-23
Published: Fri Feb 27 2026 (02/27/2026, 09:08:50 UTC)
Source: CVE Database V5
Vendor/Project: Johnson Controls
Product: Frick Controls Quantum HD

Description

Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.

AI-Powered Analysis

AILast updated: 02/27/2026, 09:40:26 UTC

Technical Analysis

CVE-2026-21659 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as path traversal) affecting Johnson Controls Frick Controls Quantum HD versions 10.22 and earlier. The vulnerability allows an unauthenticated remote attacker to exploit a local file inclusion (LFI) flaw, which can be leveraged to execute arbitrary code on the affected device. This occurs because the software fails to properly restrict file path inputs, enabling attackers to traverse directories and include unintended files. The consequence is remote code execution (RCE) without any authentication or user interaction, leading to full system compromise. The affected product is typically deployed in building automation and industrial control environments, where it manages HVAC and other critical systems. The CVSS 4.0 score of 8.7 indicates a high severity, with network attack vector, no required privileges, and no user interaction needed. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the critical nature of the systems involved and the ease of exploitation. No patches are currently linked, so mitigation relies on network segmentation, access controls, and monitoring until a vendor fix is released.

Potential Impact

The impact of CVE-2026-21659 is substantial for organizations using Johnson Controls Frick Controls Quantum HD, especially in sectors relying on building automation and industrial control systems. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and other critical infrastructure components, potentially disrupting operations, causing physical damage, or enabling further lateral movement within networks. Information disclosure through LFI can expose sensitive configuration files or credentials, facilitating deeper attacks. The vulnerability threatens confidentiality, integrity, and availability of affected systems. Given the critical role of these systems in facilities management, exploitation could impact data centers, manufacturing plants, hospitals, and commercial buildings, leading to operational downtime, safety hazards, and financial losses.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate Frick Controls Quantum HD devices from untrusted networks, limiting exposure to potential attackers. 2. Employ strict access control lists (ACLs) and firewall rules to restrict inbound traffic to only trusted management networks. 3. Monitor network traffic and device logs for unusual file access patterns or unexpected remote connections indicative of exploitation attempts. 4. Disable any unnecessary services or interfaces on the affected devices to reduce attack surface. 5. Engage with Johnson Controls for updates and patches; prioritize testing and deployment of vendor-provided fixes once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect path traversal and LFI attempts against these devices. 7. Conduct regular security assessments and penetration tests focused on building automation systems to identify and remediate similar vulnerabilities proactively. 8. Maintain an inventory of all affected devices and ensure they are tracked for timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jci
Date Reserved
2026-01-02T13:23:28.169Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1633532ffcdb8a2131e50

Added to database: 2/27/2026, 9:26:13 AM

Last enriched: 2/27/2026, 9:40:26 AM

Last updated: 2/27/2026, 11:31:24 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses