CVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD
Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.
AI Analysis
Technical Summary
CVE-2026-21659 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as path traversal) affecting Johnson Controls Frick Controls Quantum HD versions 10.22 and earlier. The vulnerability allows an unauthenticated remote attacker to exploit a local file inclusion (LFI) flaw, which can be leveraged to execute arbitrary code on the affected device. This occurs because the software fails to properly restrict file path inputs, enabling attackers to traverse directories and include unintended files. The consequence is remote code execution (RCE) without any authentication or user interaction, leading to full system compromise. The affected product is typically deployed in building automation and industrial control environments, where it manages HVAC and other critical systems. The CVSS 4.0 score of 8.7 indicates a high severity, with network attack vector, no required privileges, and no user interaction needed. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the critical nature of the systems involved and the ease of exploitation. No patches are currently linked, so mitigation relies on network segmentation, access controls, and monitoring until a vendor fix is released.
Potential Impact
The impact of CVE-2026-21659 is substantial for organizations using Johnson Controls Frick Controls Quantum HD, especially in sectors relying on building automation and industrial control systems. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and other critical infrastructure components, potentially disrupting operations, causing physical damage, or enabling further lateral movement within networks. Information disclosure through LFI can expose sensitive configuration files or credentials, facilitating deeper attacks. The vulnerability threatens confidentiality, integrity, and availability of affected systems. Given the critical role of these systems in facilities management, exploitation could impact data centers, manufacturing plants, hospitals, and commercial buildings, leading to operational downtime, safety hazards, and financial losses.
Mitigation Recommendations
1. Immediately implement network segmentation to isolate Frick Controls Quantum HD devices from untrusted networks, limiting exposure to potential attackers. 2. Employ strict access control lists (ACLs) and firewall rules to restrict inbound traffic to only trusted management networks. 3. Monitor network traffic and device logs for unusual file access patterns or unexpected remote connections indicative of exploitation attempts. 4. Disable any unnecessary services or interfaces on the affected devices to reduce attack surface. 5. Engage with Johnson Controls for updates and patches; prioritize testing and deployment of vendor-provided fixes once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect path traversal and LFI attempts against these devices. 7. Conduct regular security assessments and penetration tests focused on building automation systems to identify and remediate similar vulnerabilities proactively. 8. Maintain an inventory of all affected devices and ensure they are tracked for timely patch management.
Affected Countries
United States, Canada, Germany, United Kingdom, France, Australia, Japan, South Korea, China, India, Brazil, Mexico, Netherlands, United Arab Emirates
CVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD
Description
Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2026-21659 is a vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as path traversal) affecting Johnson Controls Frick Controls Quantum HD versions 10.22 and earlier. The vulnerability allows an unauthenticated remote attacker to exploit a local file inclusion (LFI) flaw, which can be leveraged to execute arbitrary code on the affected device. This occurs because the software fails to properly restrict file path inputs, enabling attackers to traverse directories and include unintended files. The consequence is remote code execution (RCE) without any authentication or user interaction, leading to full system compromise. The affected product is typically deployed in building automation and industrial control environments, where it manages HVAC and other critical systems. The CVSS 4.0 score of 8.7 indicates a high severity, with network attack vector, no required privileges, and no user interaction needed. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the critical nature of the systems involved and the ease of exploitation. No patches are currently linked, so mitigation relies on network segmentation, access controls, and monitoring until a vendor fix is released.
Potential Impact
The impact of CVE-2026-21659 is substantial for organizations using Johnson Controls Frick Controls Quantum HD, especially in sectors relying on building automation and industrial control systems. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code remotely without authentication. This can result in unauthorized control over HVAC and other critical infrastructure components, potentially disrupting operations, causing physical damage, or enabling further lateral movement within networks. Information disclosure through LFI can expose sensitive configuration files or credentials, facilitating deeper attacks. The vulnerability threatens confidentiality, integrity, and availability of affected systems. Given the critical role of these systems in facilities management, exploitation could impact data centers, manufacturing plants, hospitals, and commercial buildings, leading to operational downtime, safety hazards, and financial losses.
Mitigation Recommendations
1. Immediately implement network segmentation to isolate Frick Controls Quantum HD devices from untrusted networks, limiting exposure to potential attackers. 2. Employ strict access control lists (ACLs) and firewall rules to restrict inbound traffic to only trusted management networks. 3. Monitor network traffic and device logs for unusual file access patterns or unexpected remote connections indicative of exploitation attempts. 4. Disable any unnecessary services or interfaces on the affected devices to reduce attack surface. 5. Engage with Johnson Controls for updates and patches; prioritize testing and deployment of vendor-provided fixes once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect path traversal and LFI attempts against these devices. 7. Conduct regular security assessments and penetration tests focused on building automation systems to identify and remediate similar vulnerabilities proactively. 8. Maintain an inventory of all affected devices and ensure they are tracked for timely patch management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2026-01-02T13:23:28.169Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1633532ffcdb8a2131e50
Added to database: 2/27/2026, 9:26:13 AM
Last enriched: 2/27/2026, 9:40:26 AM
Last updated: 2/27/2026, 11:31:24 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1434: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Politechnika Warszawska Omega-PSIR
MediumCVE-2026-1305: CWE-287 Improper Authentication in shoheitanaka Japanized for WooCommerce
MediumCVE-2025-14142: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electriccode Electric Enquiries
MediumCVE-2024-10938: CWE-506 Embedded Malicious Code in moneytigo OVRI Payment
MediumCVE-2026-21660: CWE-256: Plaintext Storage of a Password in Johnson Controls Frick Controls Quantum HD
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.