CVE-2026-21660: CWE-256: Plaintext Storage of a Password in Johnson Controls Frick Controls Quantum HD
CVE-2026-21660 is a vulnerability in Johnson Controls Frick Controls Quantum HD (version 10. 22 and prior) where email credentials are hardcoded and stored in plaintext within the firmware. This flaw (CWE-256) allows unauthorized parties with local access to extract sensitive credentials, potentially leading to unauthorized access and system misuse. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity, with low attack complexity and no user interaction required, but local access is necessary. No known exploits are currently reported in the wild. The affected product is used in building management and HVAC control systems, making industrial and commercial facilities prime targets. Mitigation requires firmware updates or credential rotation and restricting physical or local access to devices. Countries with significant deployment of Johnson Controls building management systems, including the United States, Canada, Germany, United Kingdom, Australia, and Japan, are most at risk.
AI Analysis
Technical Summary
CVE-2026-21660 identifies a plaintext password storage vulnerability (CWE-256) in Johnson Controls' Frick Controls Quantum HD product, specifically versions 10.22 and earlier. The issue arises from hardcoded email credentials embedded in the firmware without encryption or adequate protection. Because these credentials are stored in plaintext, an attacker with local or physical access to the device can extract them, potentially gaining unauthorized access to email accounts or other systems relying on these credentials. The vulnerability does not require user interaction or prior authentication but does require local access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack vector is local, with low complexity, no privileges or user interaction needed, and high impact on confidentiality. This flaw could lead to exposure of sensitive information, unauthorized system control, or further lateral movement within a network. While no public exploits are currently known, the presence of hardcoded plaintext credentials is a significant security risk in industrial control environments. The affected product is widely used in building automation and HVAC systems, which are critical for operational continuity in commercial and industrial facilities.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality due to exposure of plaintext email credentials. This can lead to unauthorized access to email systems or other connected services, potentially enabling attackers to intercept sensitive communications or launch further attacks. The integrity and availability of the Frick Controls Quantum HD system could also be affected if attackers leverage the credentials to manipulate system settings or disrupt operations. Given the product’s role in building management and HVAC control, exploitation could result in operational disruptions, safety risks, or financial losses. Organizations relying on these systems may face increased risk of espionage, sabotage, or compliance violations. The requirement for local access limits the scope somewhat but does not eliminate risk, especially in environments with insufficient physical security or insider threats. The lack of known exploits suggests the threat is not yet widespread, but the vulnerability remains a significant risk if left unmitigated.
Mitigation Recommendations
1. Apply firmware updates or patches from Johnson Controls as soon as they become available to remove hardcoded plaintext credentials. 2. If patches are not yet available, rotate or change any credentials associated with the affected devices to prevent unauthorized use. 3. Restrict physical and local network access to Frick Controls Quantum HD devices by implementing strong physical security controls and network segmentation. 4. Monitor logs and network traffic for unusual access patterns or attempts to extract credentials. 5. Employ endpoint detection and response (EDR) tools on management workstations to detect unauthorized local access attempts. 6. Conduct regular security audits and penetration testing focused on building management systems to identify and remediate similar vulnerabilities. 7. Educate facility management and IT staff on the risks of hardcoded credentials and the importance of securing industrial control systems. 8. Consider deploying multi-factor authentication and encryption for management interfaces where supported to reduce risk from credential exposure.
Affected Countries
United States, Canada, Germany, United Kingdom, Australia, Japan, France, Netherlands, South Korea, Sweden
CVE-2026-21660: CWE-256: Plaintext Storage of a Password in Johnson Controls Frick Controls Quantum HD
Description
CVE-2026-21660 is a vulnerability in Johnson Controls Frick Controls Quantum HD (version 10. 22 and prior) where email credentials are hardcoded and stored in plaintext within the firmware. This flaw (CWE-256) allows unauthorized parties with local access to extract sensitive credentials, potentially leading to unauthorized access and system misuse. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity, with low attack complexity and no user interaction required, but local access is necessary. No known exploits are currently reported in the wild. The affected product is used in building management and HVAC control systems, making industrial and commercial facilities prime targets. Mitigation requires firmware updates or credential rotation and restricting physical or local access to devices. Countries with significant deployment of Johnson Controls building management systems, including the United States, Canada, Germany, United Kingdom, Australia, and Japan, are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-21660 identifies a plaintext password storage vulnerability (CWE-256) in Johnson Controls' Frick Controls Quantum HD product, specifically versions 10.22 and earlier. The issue arises from hardcoded email credentials embedded in the firmware without encryption or adequate protection. Because these credentials are stored in plaintext, an attacker with local or physical access to the device can extract them, potentially gaining unauthorized access to email accounts or other systems relying on these credentials. The vulnerability does not require user interaction or prior authentication but does require local access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack vector is local, with low complexity, no privileges or user interaction needed, and high impact on confidentiality. This flaw could lead to exposure of sensitive information, unauthorized system control, or further lateral movement within a network. While no public exploits are currently known, the presence of hardcoded plaintext credentials is a significant security risk in industrial control environments. The affected product is widely used in building automation and HVAC systems, which are critical for operational continuity in commercial and industrial facilities.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality due to exposure of plaintext email credentials. This can lead to unauthorized access to email systems or other connected services, potentially enabling attackers to intercept sensitive communications or launch further attacks. The integrity and availability of the Frick Controls Quantum HD system could also be affected if attackers leverage the credentials to manipulate system settings or disrupt operations. Given the product’s role in building management and HVAC control, exploitation could result in operational disruptions, safety risks, or financial losses. Organizations relying on these systems may face increased risk of espionage, sabotage, or compliance violations. The requirement for local access limits the scope somewhat but does not eliminate risk, especially in environments with insufficient physical security or insider threats. The lack of known exploits suggests the threat is not yet widespread, but the vulnerability remains a significant risk if left unmitigated.
Mitigation Recommendations
1. Apply firmware updates or patches from Johnson Controls as soon as they become available to remove hardcoded plaintext credentials. 2. If patches are not yet available, rotate or change any credentials associated with the affected devices to prevent unauthorized use. 3. Restrict physical and local network access to Frick Controls Quantum HD devices by implementing strong physical security controls and network segmentation. 4. Monitor logs and network traffic for unusual access patterns or attempts to extract credentials. 5. Employ endpoint detection and response (EDR) tools on management workstations to detect unauthorized local access attempts. 6. Conduct regular security audits and penetration testing focused on building management systems to identify and remediate similar vulnerabilities. 7. Educate facility management and IT staff on the risks of hardcoded credentials and the importance of securing industrial control systems. 8. Consider deploying multi-factor authentication and encryption for management interfaces where supported to reduce risk from credential exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jci
- Date Reserved
- 2026-01-02T13:23:28.169Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1633532ffcdb8a2131e54
Added to database: 2/27/2026, 9:26:13 AM
Last enriched: 2/27/2026, 9:42:16 AM
Last updated: 2/27/2026, 11:31:18 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1434: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Politechnika Warszawska Omega-PSIR
MediumCVE-2026-1305: CWE-287 Improper Authentication in shoheitanaka Japanized for WooCommerce
MediumCVE-2025-14142: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electriccode Electric Enquiries
MediumCVE-2024-10938: CWE-506 Embedded Malicious Code in moneytigo OVRI Payment
MediumCVE-2026-21659: CWE-23: Relative Path Traversal in Johnson Controls Frick Controls Quantum HD
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.