CVE-2026-21878
BACnet Stack · BACnet Stack C library
The BACnet Stack open-source C library for embedded systems contains a vulnerability that may impact the security and stability of building automation and control networks.
Executive summary
A high-severity vulnerability in the BACnet Stack C library poses a significant risk to embedded systems and industrial control environments by potentially allowing unauthorized interference.
Vulnerability
This vulnerability affects the core C library used for implementing the BACnet protocol in embedded systems. While specific technical details are limited, the flaw typically involves improper handling of protocol-specific data packets by unauthenticated network actors.
Business impact
Compromise of the BACnet Stack can lead to the disruption of building automation systems, including HVAC, lighting, and security controls. Given the CVSS score of 7.5, the risk involves potential denial-of-service or unauthorized command execution, which could result in operational downtime and physical security risks in critical infrastructure.
Remediation
Immediate Action: Apply the latest security patches provided by the BACnet Stack project maintainers or the respective hardware vendor using this library.
Proactive Monitoring: Monitor network traffic for anomalous BACnet protocol traffic and review system logs for unexpected reboots or service failures.
Compensating Controls: Isolate BACnet-enabled devices on dedicated VLANs and use industrial firewalls to restrict access to authorized management workstations only.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The reliance of critical infrastructure on the BACnet protocol makes this a high-priority concern. Security teams should identify all embedded devices utilizing the BACnet Stack and coordinate with vendors to ensure firmware is updated to the most secure version available.