Categories: Cyber Security News

CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers

A critical advisory warning regarding a severe vulnerability affecting Honeywell CCTV products, published on February 17, 2026, under advisory ICSA-26-048-04.

The alert details a high-severity security flaw that could allow malicious actors to completely hijack user accounts and gain unauthorized access to sensitive camera feeds.

The vulnerability has been assigned a CVSS v3 score of 9.8, categorizing it as critical. The specific vulnerability, CVE-2026-1670, is a missing authentication issue affecting a critical function.

The flaw allows an unauthenticated attacker to modify the password recovery email address associated with the device without requiring prior login credentials.

CVE ID CVSS Score Description
CVE-2026-1670 9.8 Missing Authentication for Critical Function allowing unauthenticated recovery email changes.

Once the recovery email has been changed to an address controlled by the attacker, they can initiate a password reset to take over the administrative account.

This level of access not only compromises the video feeds but could also serve as a pivot point for further network compromise within the facility. The issue affects multiple versions of Honeywell’s IP and PTZ camera lines.

Product Name Affected Version
I-HIB2PI-UL 2MP IP 6.1.22.1216
SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0
PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0
25M IPC WDR_2MP_32M_PTZ_v2.0

Security researcher Souvik Kandar has been credited with discovering and reporting this vulnerability to CISA. The affected equipment is deployed worldwide, primarily within the commercial facilities sector.

CISA has not reported any known public exploitation of this vulnerability at the time of publication. However, immediate action is recommended due to the ease of exploitation.

Sponsored

Administrators are advised to minimize network exposure for all control system devices, ensuring they are never directly accessible from the open Internet.

Control system networks should be located behind firewalls and isolated from business networks to prevent lateral movement.

For organizations requiring remote access, CISA suggests using secure methods such as Virtual Private Networks (VPNs), while ensuring the VPN devices themselves are updated to the latest versions.

Users are also encouraged to implement social engineering defenses, as attackers often use phishing to gain initial entry before exploiting internal vulnerabilities.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Chichester adopts open enrollment, sets up trust fund to plan for potential state law

If open enrollment comes to pass, John White said his town could benefit from students…

32 minutes ago

NIU at RVC engineering program celebrates 10 years of connecting local talent with area companies

Rock Valley College is celebrating a major milestone in their partnership with Northern Illinois University.…

3 hours ago

Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking

A critical vulnerability in AVideo, a widely used open-source video hosting and streaming platform. Tracked…

3 hours ago

‘Restyle the Runway’ event focuses on fashion and sustainability

Womanspace and Tad More Tailoring partnered to host the "Restyle the Runway" event Saturday afternoon…

3 hours ago

The Best Deals Today: Mario Kart World, Splatoon 3, LEGO Super Mario, and More

A new weekend has arrived, and today, you can save on Mario Kart World for…

10 hours ago

This website uses cookies.