


Perceptive Security
SOC/SIEM Consultancy

Honeywell IQ4x BMS Controller
Published:
10 maart 2026 om 12:00:00
Alert date:
10 maart 2026 om 18:06:15
Source:
cisa.gov
Critical Infrastructure, Mobile & IoT, Network Infrastructure
Critical vulnerability in Honeywell IQ4x Building Management System controllers allows unauthorized access to controller management settings without authentication. The vulnerability affects multiple IQ4x models in factory-default configuration where the web-based HMI is exposed without authentication, operating under System Guest privileges with read/write access. Attackers can create administrative accounts and lock out legitimate operators from local and web-based configuration. The CVSS score is 10.0 (Critical) with network-based attack vector requiring no privileges or user interaction. Honeywell has not yet released a fix for this vulnerability affecting worldwide critical infrastructure sectors including healthcare, manufacturing, and government facilities.
Technical details
Mitigation steps:
Affected products:
Honeywell IQ4E
Honeywell IQ412
Honeywell IQ422
Honeywell IQ4NC
Honeywell IQ41x
Honeywell IQ3
Honeywell IQECO
Related links:
https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-03
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-069-03.json
https://nvd.nist.gov/vuln/detail/CVE-2026-3611
https://www.honeywell.com/us/en/contact
https://cwe.mitre.org/data/definitions/306.html
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
https://www.cisa.gov/notification
https://www.cisa.gov/privacy-policy
https://cisa.gov/ics
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
