<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Johnson Controls Inc. — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/johnson-controls-inc./</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/johnson-controls-inc./feed.xml" rel="self" type="application/rss+xml"/><item><title>Johnson Controls CEM AC2000 Privilege Escalation via DLL Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-05-johnson-controls-privesc/</link><pubDate>Tue, 05 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-johnson-controls-privesc/</guid><description>A vulnerability exists in Johnson Controls CEM AC2000 versions 12.0, 11.0, and 10.6 due to an uncontrolled search path element that could allow a standard user to escalate privileges on the host machine via DLL hijacking.</description><content:encoded><![CDATA[<p>Johnson Controls CEM AC2000, a physical access control system, is vulnerable to DLL hijacking due to an uncontrolled search path element. This vulnerability, identified as CVE-2026-21661, affects versions 12.0, 11.0, and 10.6. Successful exploitation could allow a standard user to escalate their privileges on the host machine. The affected sectors include Critical Manufacturing, Commercial Facilities, Government Services and Facilities, Transportation Systems, and Energy. Johnson Controls recommends upgrading to specific releases to mitigate this vulnerability. This privilege escalation could grant unauthorized access to sensitive areas and systems controlled by the CEM AC2000 software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A standard user logs into a Windows system where a vulnerable version of Johnson Controls CEM AC2000 is installed.</li>
<li>The user executes the CEM AC2000 application, which attempts to load a specific DLL file.</li>
<li>Due to an uncontrolled search path element (CWE-427), the application searches for the DLL in a predictable, user-writable directory before searching the system&rsquo;s legitimate DLL directories.</li>
<li>The attacker places a malicious DLL file with the expected name in the user-writable directory.</li>
<li>The CEM AC2000 application loads the malicious DLL instead of the legitimate one.</li>
<li>The malicious DLL executes with the privileges of the CEM AC2000 application, which, due to the vulnerability, are elevated compared to the initial user.</li>
<li>The attacker now has elevated privileges on the host machine, potentially allowing them to access sensitive data or control system functions.</li>
<li>The attacker can now install malicious software, modify system settings, or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-21661 allows a standard user to escalate privileges on the host machine running Johnson Controls CEM AC2000. This can lead to unauthorized access to sensitive areas controlled by the system, manipulation of physical security controls, or further compromise of the underlying operating system. Given the wide deployment of CEM AC2000 across critical infrastructure sectors, this vulnerability poses a significant risk to physical and cyber security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CEM AC 2000 12.0 to 12.0 Release 10 as recommended by Johnson Controls to remediate CVE-2026-21661.</li>
<li>Upgrade CEM AC 2000 11.0 to 11.0 Release 9 as recommended by Johnson Controls to remediate CVE-2026-21661.</li>
<li>Upgrade CEM AC 2000 10.6 to 10.6 Release 3 as recommended by Johnson Controls to remediate CVE-2026-21661.</li>
<li>Monitor process creation events for CEM AC2000 loading DLLs from unusual or user-writable paths using the &ldquo;Suspicious DLL Load by CEM AC2000&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>dll-hijacking</category><category>cem-ac2000</category></item></channel></rss>