What's Happening?
A cybersecurity researcher, Gjoko Krstic, has identified a potential vulnerability in Honeywell's IQ4 building management controller. Krstic claims that the product's web-based human-machine interface (HMI) is exposed without authentication in its default
configuration, allowing remote attackers to create administrator accounts before legitimate users. This could potentially lock out legitimate operators from managing the system. Honeywell, however, disputes the severity of the vulnerability, stating that the IQ4 devices are designed for on-premises use and should not be exposed to the internet. The company argues that the vulnerability can only occur during a brief installation phase and that security is automatically enabled when installed correctly. Despite Honeywell's assurances, Krstic reports finding nearly 7,500 internet-exposed instances of the product, with about 20% accessible without authentication.
Why It's Important?
The dispute highlights significant concerns about cybersecurity in building management systems, which are increasingly targeted by threat actors. If the vulnerability is as severe as Krstic suggests, it could expose critical infrastructure, such as schools and commercial buildings, to unauthorized access and control. This situation underscores the importance of robust security measures in the deployment of such systems, especially as they become more interconnected and reliant on internet access. The disagreement also raises questions about the responsibility of manufacturers to ensure their products are secure by default and the role of researchers in identifying and disclosing vulnerabilities.
What's Next?
The ongoing debate between Honeywell and Krstic may lead to further scrutiny of the IQ4 controller and similar products. Honeywell may face pressure to release patches or updates to address the reported vulnerability, especially if more instances of unauthorized access are discovered. Additionally, the involvement of the CERT Coordination Center suggests that a formal vulnerability disclosure process may be underway, potentially leading to broader industry discussions on securing building management systems. Stakeholders, including building operators and cybersecurity professionals, will likely monitor the situation closely to assess the risk and implement necessary safeguards.









