Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Honeywell Disputes Severity of Building Controller Vulnerability

Honeywell Disputes Severity of Building Controller Vulnerability

Posted on March 3, 2026 By CWS

A cybersecurity researcher and Honeywell are at odds over the seriousness of a vulnerability found in one of the company’s building management controllers. The researcher claims the issue is significant, while Honeywell maintains that the impact is minimal.

Researcher’s Findings on Honeywell’s IQ4 Controller

Gjoko Krstic, a recognized figure in cybersecurity, particularly in the field of building control systems, recently scrutinized Honeywell’s IQ4 controller. Krstic discovered that the product’s web-based human-machine interface (HMI) is exposed without needing authentication if left in its factory-default settings.

Further analysis by Krstic revealed that improper configuration and the absence of user module activation during setup could allow remote attackers to create administrator accounts. This could potentially lock legitimate users out of the system’s configuration and administration interfaces.

Implications and Vendor’s Response

The vulnerability poses a risk to various facilities such as schools and commercial buildings that utilize the system. Despite these findings, Honeywell has not released any patches, noting that the IQ4 is intended for on-premises use and should not be exposed to the internet.

According to Honeywell, the device is shipped unconfigured and must be set up by trained personnel before use. The company asserts that any security lapse during the initial installation phase can be rectified with a standard reset, and normal installation processes automatically enable security settings.

Disagreement Over Security Risks

Krstic contests Honeywell’s position, pointing out that approximately 7,500 instances of the IQ4 are accessible online, with about 20% lacking authentication protection. He also claims that incomplete setups still allow unauthorized control over building components such as lighting and temperature.

While SecurityWeek confirms many IQ4 interfaces are available on the internet, other claims remain unverified. Krstic has initiated a CVE process for the vulnerability and contacted the CERT Coordination Center for further mediation.

Cybersecurity experts warn that building automation systems are frequent targets for malicious actors, emphasizing the ongoing importance of robust security measures in industrial control systems.

Security Week News Tags:building management, CERT, Cybersecurity, Honeywell, Infrastructure, IQ4 controller, Krstic, Security, Threats, Vulnerability

Post navigation

Previous Post: AI Tool CyberStrikeAI Powers Global FortiGate Attacks
Next Post: Cyber Conflict Escalates as Iran Faces Major Disruptions

Related Posts

Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe Security Week News
Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid Security Week News
White House Scraps ‘Burdensome’ Software Security Rules  White House Scraps ‘Burdensome’ Software Security Rules  Security Week News
Hacktivist Surge Amid US-Israel Strikes on Iran Hacktivist Surge Amid US-Israel Strikes on Iran Security Week News
Why Automated Pentesting Needs a Broader Approach Why Automated Pentesting Needs a Broader Approach Security Week News
SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark