Authentication Bypass Vulnerability in Honeywell IQ4x Building Management Controller
CVE-2026-3611

10CRITICAL

Key Information:

Vendor

Honeywell

Status
Iq4e
Iq412
Iq422
Iq4nc
Vendor
CVE Published:
12 March 2026

What is CVE-2026-3611?

The Honeywell IQ4x building management controller presents a significant security concern as it exposes its entire web-based human-machine interface (HMI) without authentication in its factory-default configuration. By default, the system operates under a System Guest context, allowing unrestricted read/write access to the HTTP interface. A remote attacker can exploit this vulnerability to create a new account with administrative privileges before any authentication is enforced, effectively locking out legitimate users from local and web-based management functionalities. The inability to securely manage user access poses a serious risk to the integrity of building management systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

IQ3 v3.50_3.44 <= 4.36 (build 4.3.7.9)

IQ412 v3.50_3.44 <= 4.36 (build 4.3.7.9)

IQ41x v3.50_3.44 <= 4.36 (build 4.3.7.9)

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gjoko Krstic of Zero Science reported this vulnerability to Honeywell.
.