Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Honeywell Disputes Severity of Building Controller Vulnerability

Honeywell Disputes Severity of Building Controller Vulnerability

Posted on March 3, 2026 By CWS

A cybersecurity researcher and Honeywell are at odds over the seriousness of a vulnerability found in one of the company’s building management controllers. The researcher claims the issue is significant, while Honeywell maintains that the impact is minimal.

Researcher’s Findings on Honeywell’s IQ4 Controller

Gjoko Krstic, a recognized figure in cybersecurity, particularly in the field of building control systems, recently scrutinized Honeywell’s IQ4 controller. Krstic discovered that the product’s web-based human-machine interface (HMI) is exposed without needing authentication if left in its factory-default settings.

Further analysis by Krstic revealed that improper configuration and the absence of user module activation during setup could allow remote attackers to create administrator accounts. This could potentially lock legitimate users out of the system’s configuration and administration interfaces.

Implications and Vendor’s Response

The vulnerability poses a risk to various facilities such as schools and commercial buildings that utilize the system. Despite these findings, Honeywell has not released any patches, noting that the IQ4 is intended for on-premises use and should not be exposed to the internet.

According to Honeywell, the device is shipped unconfigured and must be set up by trained personnel before use. The company asserts that any security lapse during the initial installation phase can be rectified with a standard reset, and normal installation processes automatically enable security settings.

Disagreement Over Security Risks

Krstic contests Honeywell’s position, pointing out that approximately 7,500 instances of the IQ4 are accessible online, with about 20% lacking authentication protection. He also claims that incomplete setups still allow unauthorized control over building components such as lighting and temperature.

While SecurityWeek confirms many IQ4 interfaces are available on the internet, other claims remain unverified. Krstic has initiated a CVE process for the vulnerability and contacted the CERT Coordination Center for further mediation.

Cybersecurity experts warn that building automation systems are frequent targets for malicious actors, emphasizing the ongoing importance of robust security measures in industrial control systems.

Security Week News Tags:building management, CERT, Cybersecurity, Honeywell, Infrastructure, IQ4 controller, Krstic, Security, Threats, Vulnerability

Post navigation

Previous Post: AI Tool CyberStrikeAI Powers Global FortiGate Attacks
Next Post: Cyber Conflict Escalates as Iran Faces Major Disruptions

Related Posts

GitHub Copilot Chat Flaw Leaked Data From Private Repositories GitHub Copilot Chat Flaw Leaked Data From Private Repositories Security Week News
OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail Security Week News
Google’s  Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
Mitel Patches Critical Flaw in Enterprise Communication Platform Mitel Patches Critical Flaw in Enterprise Communication Platform Security Week News
CISO Communities – Cybersecurity’s Secret Weapon CISO Communities – Cybersecurity’s Secret Weapon Security Week News
High-Severity Remote Code Execution Vulnerability Patched in OpenSSL High-Severity Remote Code Execution Vulnerability Patched in OpenSSL Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WebKit Exploit Forces iOS Safari Users onto Scam Pages
  • Hacktivist Surge Amid US-Israel Strikes on Iran
  • Fake IT Support Scam Spreads Havoc C2 Framework
  • Google Introduces MTCs to Secure HTTPS from Quantum Risks
  • University of Hawaii Data Breach Affects 1.2 Million

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WebKit Exploit Forces iOS Safari Users onto Scam Pages
  • Hacktivist Surge Amid US-Israel Strikes on Iran
  • Fake IT Support Scam Spreads Havoc C2 Framework
  • Google Introduces MTCs to Secure HTTPS from Quantum Risks
  • University of Hawaii Data Breach Affects 1.2 Million

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News