The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-21661

CVE-2026-21661: Johnson Controls AC2000 Path Traversal Flaw

CVE-2026-21661 is a path traversal vulnerability in Johnson Controls AC2000 that enables attackers to manipulate configuration file search paths. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-21661 Overview

CVE-2026-21661 is an Uncontrolled Search Path Element vulnerability [CWE-427] affecting Johnson Controls AC2000 access control software on Windows. The flaw lets a local authenticated attacker manipulate configuration file search paths to load attacker-controlled resources. Successful exploitation can lead to high-impact compromise of confidentiality and integrity on the host running AC2000.

The issue affects AC2000 versions from 10.6 before release 10, from 11.0 before release 9, and from 12 before release 3. Johnson Controls has published guidance through its security advisory portal.

Critical Impact

A local attacker with low privileges can leverage manipulated search paths to execute attacker-controlled configuration or binaries within the AC2000 process context.

Affected Products

  • Johnson Controls AC2000 versions 10.6 prior to release 10
  • Johnson Controls AC2000 versions 11.0 prior to release 9
  • Johnson Controls AC2000 versions 12 prior to release 3

Discovery Timeline

  • 2026-05-06 - CVE-2026-21661 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-21661

Vulnerability Analysis

The vulnerability stems from Johnson Controls AC2000 resolving configuration file paths through an uncontrolled search sequence on Windows. When the application loads configuration data, it consults directories that a low-privileged local user can write to or influence. An attacker who places a crafted configuration file along that search path forces AC2000 to read attacker-controlled values.

Because AC2000 is an enterprise access control product, modified configuration data can alter authentication logic, redirect logging, or change paths to dependent binaries. The CVSS vector indicates a local attack with low complexity and low privileges, no user interaction, and high impact to confidentiality and integrity.

Root Cause

The root cause is improper restriction of the search path used to locate configuration resources, classified under [CWE-427] Uncontrolled Search Path Element. The application relies on relative paths or insecure directory ordering rather than absolute, ACL-protected locations. This permits planted files in user-writable directories to take precedence over legitimate configuration sources.

Attack Vector

Exploitation requires local access with valid low-privileged credentials on the Windows host running AC2000. The attacker writes a malicious configuration file or library to a directory that appears earlier in the AC2000 search order. When the AC2000 service or component subsequently reads configuration, it loads the attacker-supplied data, granting control over application behavior in a higher-privileged context.

No verified public exploit code is available for CVE-2026-21661. Refer to the Johnson Controls Security Advisory for vendor-supplied technical details.

Detection Methods for CVE-2026-21661

Indicators of Compromise

  • Unexpected configuration files appearing in directories along the AC2000 search path, especially in user-writable locations
  • New or modified DLLs or .ini/.cfg files within AC2000 working directories not matching vendor-shipped hashes
  • AC2000 processes reading configuration from non-standard paths recorded in Sysmon Event ID 11 (FileCreate) or Event ID 1 (ProcessCreate)
  • Anomalous child processes spawned by AC2000 service accounts following configuration reload

Detection Strategies

  • Baseline the legitimate AC2000 installation directory contents and alert on file additions or modifications outside vendor updates
  • Monitor file system access by AC2000 service binaries using endpoint telemetry to flag reads from unexpected directories
  • Hunt for low-privileged users writing files into directories shared with AC2000 components
  • Correlate file creation events with subsequent AC2000 service restarts or configuration reloads

Monitoring Recommendations

  • Enable Windows Security auditing for object access on AC2000 install paths and parent directories
  • Forward Sysmon and Windows Event Logs to a centralized SIEM for path-traversal and DLL-loading analytics
  • Track integrity of AC2000 configuration files using file integrity monitoring tools with cryptographic hashing
  • Alert on AC2000 processes loading modules from non-system, non-vendor directories

How to Mitigate CVE-2026-21661

Immediate Actions Required

  • Upgrade AC2000 to release 10 for the 10.6 branch, release 9 for the 11.0 branch, or release 3 for the 12 branch
  • Restrict interactive and remote logon rights on AC2000 hosts to a minimal set of administrators
  • Apply NTFS ACLs that prevent non-administrative users from writing to any directory the AC2000 service reads
  • Audit existing AC2000 directories for unauthorized files prior to applying updates

Patch Information

Johnson Controls has released fixed versions addressing the uncontrolled search path behavior. Consult the Johnson Controls Security Advisory for download links, release notes, and verification hashes for each affected branch.

Workarounds

  • Run AC2000 services under a dedicated, least-privileged service account isolated from interactive users
  • Place AC2000 hosts on a segmented management network with restricted local logon access
  • Apply application allowlisting to prevent execution of unsigned binaries from AC2000 working directories
  • Enable Windows Defender Application Control or AppLocker policies to enforce trusted load paths
bash
# Configuration example
# Restrict write access on AC2000 directories to administrators and SYSTEM
icacls "C:\Program Files\AC2000" /inheritance:r
icacls "C:\Program Files\AC2000" /grant:r "Administrators:(OI)(CI)F" "SYSTEM:(OI)(CI)F" "Users:(OI)(CI)RX"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechJohnsoncontrols

  • SeverityHIGH

  • CVSS Score8.4

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-427
  • Technical References
  • Johnson Controls Security Advisory
  • Related CVEs
  • CVE-2026-21657: Frick Quantum HD Firmware RCE Vulnerability

  • CVE-2026-21658: Frick Quantum HD Firmware RCE Vulnerability

  • CVE-2026-21659: Frick Controls Quantum HD RCE Vulnerability

  • CVE-2024-0912: C-CURE 9000 Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English