Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Honeywell is aware of the issue, but has not released a fix. For more information, contact Honeywell directly. [https://www.honeywell.com/us/en/contact](https://www.honeywell.com/us/en/contact).
Fri, 13 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Honeywell
Honeywell iq3 Honeywell iq412 Honeywell iq41x Honeywell iq422 Honeywell iq4e Honeywell iq4nc Honeywell iqeco |
|
| Vendors & Products |
Honeywell
Honeywell iq3 Honeywell iq412 Honeywell iq41x Honeywell iq422 Honeywell iq4e Honeywell iq4nc Honeywell iqeco |
Thu, 12 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration. | |
| Title | Honeywell IQ4x BMS Controller Missing authentication for critical function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-13T18:03:02.081Z
Reserved: 2026-03-05T18:12:38.425Z
Link: CVE-2026-3611
Updated: 2026-03-13T18:02:56.756Z
Status : Awaiting Analysis
Published: 2026-03-12T21:16:27.693
Modified: 2026-03-13T20:06:54.667
Link: CVE-2026-3611
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:49:54Z