Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Honeywell Disputes Severity of Building Controller Vulnerability

Honeywell Disputes Severity of Building Controller Vulnerability

Posted on March 3, 2026 By CWS

A cybersecurity researcher and Honeywell are at odds over the seriousness of a vulnerability found in one of the company’s building management controllers. The researcher claims the issue is significant, while Honeywell maintains that the impact is minimal.

Researcher’s Findings on Honeywell’s IQ4 Controller

Gjoko Krstic, a recognized figure in cybersecurity, particularly in the field of building control systems, recently scrutinized Honeywell’s IQ4 controller. Krstic discovered that the product’s web-based human-machine interface (HMI) is exposed without needing authentication if left in its factory-default settings.

Further analysis by Krstic revealed that improper configuration and the absence of user module activation during setup could allow remote attackers to create administrator accounts. This could potentially lock legitimate users out of the system’s configuration and administration interfaces.

Implications and Vendor’s Response

The vulnerability poses a risk to various facilities such as schools and commercial buildings that utilize the system. Despite these findings, Honeywell has not released any patches, noting that the IQ4 is intended for on-premises use and should not be exposed to the internet.

According to Honeywell, the device is shipped unconfigured and must be set up by trained personnel before use. The company asserts that any security lapse during the initial installation phase can be rectified with a standard reset, and normal installation processes automatically enable security settings.

Disagreement Over Security Risks

Krstic contests Honeywell’s position, pointing out that approximately 7,500 instances of the IQ4 are accessible online, with about 20% lacking authentication protection. He also claims that incomplete setups still allow unauthorized control over building components such as lighting and temperature.

While SecurityWeek confirms many IQ4 interfaces are available on the internet, other claims remain unverified. Krstic has initiated a CVE process for the vulnerability and contacted the CERT Coordination Center for further mediation.

Cybersecurity experts warn that building automation systems are frequent targets for malicious actors, emphasizing the ongoing importance of robust security measures in industrial control systems.

Security Week News Tags:building management, CERT, Cybersecurity, Honeywell, Infrastructure, IQ4 controller, Krstic, Security, Threats, Vulnerability

Post navigation

Previous Post: AI Tool CyberStrikeAI Powers Global FortiGate Attacks
Next Post: Cyber Conflict Escalates as Iran Faces Major Disruptions

Related Posts

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News
SafeHill Emerges from Stealth With .6 Million Pre-Seed Funding SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding Security Week News
Sublime Security Raises 0 Million for Email Security Platform Sublime Security Raises $150 Million for Email Security Platform Security Week News
Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Security Week News
Atlassian, GitLab, Zoom Release Security Patches Atlassian, GitLab, Zoom Release Security Patches Security Week News
Scattered Spider Targeting VMware vSphere Environments Scattered Spider Targeting VMware vSphere Environments Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities
  • WebKit Exploit Forces iOS Safari Users onto Scam Pages
  • Hacktivist Surge Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities
  • WebKit Exploit Forces iOS Safari Users onto Scam Pages
  • Hacktivist Surge Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News