These devices control HVAC, lighting, and other building functions in schools, offices, and commercial sites.
In their default setup, they expose a full web-based human-machine interface (HMI) without any authentication.
This allows anyone with network access to take full read/write control, create admin accounts, or lock out legitimate users.
The issue, detailed in advisory ZSL-2026-5979 released on March 2, 2026, affects models like IQ4E, IQ412, and IQ422.
No login is needed at factory defaults; attackers operate as a “System User” with level 100 privileges. They can even access a hidden “Diagnostics Overview” page via URLs like /^.htm, expanding the risks.
Zero Science Labs warns that remote attackers can reach the HTTP interface (default port 80) and use the U.htm page to create a new admin user before any security kicks in.
This flips on the user module under attacker-chosen credentials, potentially locking operators out of web and local config. A proof-of-concept script, trendhmi.py, demonstrates this remote web-HMI control.
Honeywell insists the controllers are for on-premise use only, not internet-facing setups. But flat networks, VPNs, and remote access often expose them anyway.
“Security must be engineered for resilience, not isolation,” notes researcher Krstic, quoting AI Joe. The vendor’s manual urges enabling security per best practices, but defaults leave systems wide open.
Affected Versions Table
| Model | Firmware Version (Build) |
|---|---|
| IQ4E, IQ412, IQ422, IQ4NC, IQ41x, IQ3, IQECO | 4.36 (4.3.7.9), 4.34 (4.3.5.14), 3.52 (3.5.3.15), 3.50, 3.44 |
Tested on webServr XML Web Services. Impacts include security bypass, full system access, and DoS via lockout. Risk rated 5/5.
Discovery timeline highlights slow response:
Key IOCs
| Type | Indicator | Context/Source |
|---|---|---|
| URL | /U.htm | User creation endpoint (ZSL) |
| URL | /^.htm or /%5E.htm | Hidden diagnostics (ZSL) |
| PoC | trendhmi.py | Zero Science |
Mitigations:
This flaw underscores that ICS/OT risks defaults must assume exposure. Thousands may be vulnerable per internet scans.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Honeywell Controllers Exposed Online Without Authentication, Thousands at Risk appeared first on Cyber Security News.
A jump starter is an essential part of car's emergency kit, but you don't need…
FORT WAYNE, Ind. (WOWO) — Rain is possible again in Indiana this weekend as temperatures…
MIAIMI COUNTY, Ind. (WOWO) — Federal government payments to keep immigration detainees at an Indiana…
U.S. Secretary of Defense Pete Hegseth listens to questions during a news conference at the…
Guess they weren’t kidding with that “Oscars host for life” sketch at last year’s show.…
Christopher Nolan has confirmed a casting twist for his upcoming “mythic action epic,” The Odyssey.…
This website uses cookies.