🔐 CVE Alert

CVE-2026-3611

CRITICAL 10.0

Honeywell IQ4x BMS Controller Missing authentication for critical function

CVSS Score
10.0
EPSS Score
0.2%
EPSS Percentile
44th

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

CWE CWE-306
Vendor honeywell
Product iq4e
Published Mar 12, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for honeywell iq4e

Be the first to know when new critical vulnerabilities affecting honeywell iq4e are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Honeywell / IQ4E
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQ412
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQ422
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQ4NC
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQ41x
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQ3
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)
Honeywell / IQECO
v3.50_3.44 ≤ 4.36 (build 4.3.7.9)

References

NVD ↗ CVE.org ↗ EPSS Data ↗
cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-03 github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-069-03.json honeywell.com: https://www.honeywell.com/us/en/contact

Credits

Gjoko Krstic of Zero Science reported this vulnerability to Honeywell.