CVE-2026-21878

BACnet Stack · BACnet Stack C library

The BACnet Stack open-source C library for embedded systems contains a vulnerability that may impact the security and stability of building automation and control networks.

Executive summary

A high-severity vulnerability in the BACnet Stack C library poses a significant risk to embedded systems and industrial control environments by potentially allowing unauthorized interference.

Vulnerability

This vulnerability affects the core C library used for implementing the BACnet protocol in embedded systems. While specific technical details are limited, the flaw typically involves improper handling of protocol-specific data packets by unauthenticated network actors.

Business impact

Compromise of the BACnet Stack can lead to the disruption of building automation systems, including HVAC, lighting, and security controls. Given the CVSS score of 7.5, the risk involves potential denial-of-service or unauthorized command execution, which could result in operational downtime and physical security risks in critical infrastructure.

Remediation

Immediate Action: Apply the latest security patches provided by the BACnet Stack project maintainers or the respective hardware vendor using this library.

Proactive Monitoring: Monitor network traffic for anomalous BACnet protocol traffic and review system logs for unexpected reboots or service failures.

Compensating Controls: Isolate BACnet-enabled devices on dedicated VLANs and use industrial firewalls to restrict access to authorized management workstations only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The reliance of critical infrastructure on the BACnet protocol makes this a high-priority concern. Security teams should identify all embedded devices utilizing the BACnet Stack and coordinate with vendors to ensure firmware is updated to the most secure version available.