CVE-2026-21654
Published: 27 February 2026
Summary
CVE-2026-21654 is a critical-severity OS Command Injection (CWE-78) vulnerability in Johnsoncontrols Frick Controls Quantum Hd Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates OS command injection by enforcing validation of untrusted inputs used in OS commands before processing.
Addresses the specific flaw in Quantum HD version 10.22 and prior through timely installation of vendor-provided security patches.
Complements input validation by restricting the types and quantities of inputs to prevent exploitation of command injection parameters.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection in a network-accessible device enables exploitation of public-facing application (T1190) and arbitrary command execution via OS command interpreter (T1059).
NVD Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the…
more
security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.
Deeper analysisAI
CVE-2026-21654 is an OS Command Injection vulnerability (CWE-78) affecting Johnson Controls Frick Controls Quantum HD in versions 10.22 and prior. The flaw stems from improper neutralization of special elements used in OS commands, with insufficient validation of input in certain parameters. This allows unexpected actions that impact device security even before authentication occurs. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.
Remote attackers require no privileges, authentication, or user interaction to exploit the issue over the network with low complexity. Successful exploitation enables arbitrary OS command execution on the affected device, potentially resulting in high-impact compromise of confidentiality, integrity, and availability, such as full system control or disruption of industrial control functions.
CISA has published ICS Advisory ICSA-26-057-01, and Johnson Controls has issued related guidance via its Trust Center cybersecurity security advisories page, detailing mitigation steps for this vulnerability.
Details
- CWE(s)