Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities
Multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.
Multiple vulnerabilities have been identified in Johnson Controls, Inc. Frick Controls Quantum HD versions 10.22 and earlier. These vulnerabilities, including CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658, CVE-2026-21659, and CVE-2026-21660, can be exploited to achieve pre-authentication remote code execution, information leaks, or denial of service. Given that Frick Controls Quantum HD is deployed worldwide, particularly in the Food and Agriculture sector, these vulnerabilities pose a significant risk. Johnson Controls recommends upgrading to Quantum HD Unity, version 12 or higher, to mitigate these risks. Versions 10.22 through 11 are no longer supported.
Attack Chain
- An attacker identifies a vulnerable Frick Controls Quantum HD device exposed to the network.
- The attacker sends a specially crafted request to the device exploiting the input validation vulnerabilities (CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658).
- Due to the insufficient validation of input, the crafted request allows the attacker to inject malicious code into the system (CWE-78, CWE-94).
- The injected code is executed by the device, granting the attacker unauthorized access.
- The attacker leverages the code execution to perform further actions such as gaining access to sensitive information (information leak), or causing the device to crash (denial of service).
- If successful RCE is achieved, the attacker may use this to move laterally within the OT network.
- The attacker could then target other critical systems within the food and agriculture environment.
Impact
Successful exploitation of these vulnerabilities can lead to severe consequences, especially in critical infrastructure sectors like Food and Agriculture. Attackers could remotely execute arbitrary code on the affected systems without authentication, potentially disrupting industrial processes, stealing sensitive data, or causing a complete shutdown of operations. With Quantum HD systems deployed globally, a widespread attack could affect numerous organizations, leading to significant financial losses and supply chain disruptions.
Recommendation
- Immediately upgrade all Frick Controls Quantum HD devices to the latest platform, Quantum HD Unity, version 12 or higher, as recommended by Johnson Controls (CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658, CVE-2026-21659, CVE-2026-21660).
- After upgrading to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
- Monitor network traffic for suspicious requests targeting Frick Controls Quantum HD devices (Network Connection logs).
- Refer to Johnson Controls Product Security Advisory JCI-PSA-2026-05 for more detailed mitigation instructions at https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories.
Detection coverage 2
Detect Attempted Access to Frick Controls Quantum HD Web Interface
infoDetects attempts to access the web interface of Frick Controls Quantum HD devices, which may indicate reconnaissance or exploitation attempts.
Detect Exploitation Attempts via URI
highDetects URI strings known to be associated with code injection attacks
Detection queries are kept inside the platform. Get full rules →