CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章标题提到CISA警告Honeywell的CCTV存在一个关键的认证绕过漏洞CVE-2026-1670。接着,文中详细说明了这个漏洞的CVSS评分是9.8,属于高危。攻击者可以利用这个漏洞,在未认证的情况下更改恢复邮箱,进而接管账户,访问摄像头画面。 文章还提到了受影响的具体型号和这些设备在全球关键基础设施中的广泛应用。CISA建议采取隔离设备、使用防火墙和VPN等措施来降低风险,并建议用户避免点击可疑链接。 现在,我需要将这些信息浓缩到100字以内。重点包括:CISA警告、Honeywell CCTV的漏洞、CVSS评分、攻击者的能力、受影响型号的应用场景以及建议的缓解措施。 要注意用词简洁,避免重复信息。比如,“关键认证绕过漏洞”可以简化为“高危认证绕过漏洞”。同时,要确保所有关键点都被涵盖:漏洞名称、评分、影响范围、攻击后果以及应对措施。 最后检查字数是否在限制内,并确保语句通顺自然。 </think> CISA警告Honeywell部分CCTV设备存在高危认证绕过漏洞(CVE-2026-1670),CVSS评分为9.8。该漏洞允许攻击者无需认证即可更改恢复邮箱并接管账户,从而获取摄像头实时画面访问权限。此漏洞影响多个型号设备,广泛应用于全球关键基础设施和政府设施。CISA建议采取隔离设备、使用防火墙和VPN等措施降低风险。 2026-2-19 11:54:1 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs

Pierluigi Paganini February 19, 2026

CISA warns Honeywell CCTVs are affected by a critical auth bypass flaw (CVE-2026-1670) allowing unauthorized access or account hijacking.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns that Honeywell CCTVs are affected by a critical authentication bypass flaw, tracked as CVE-2026-1670 (CVSS score of 9.8), that lets attackers change the recovery email without logging in. This vulnerability enables account takeovers and unauthorized access to camera feeds by exploiting an unauthenticated API endpoint for password recovery.

“Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading to further network compromise.” reads the alert published by CISA.

The vulnerability was discovered by cybersecurity researcher Souvik Kandar.

The vulnerability impacts the following Honeywell CCTVs models:

  • I-HIB2PI-UL 2MP IP 6.1.22.1216 (CVE-2026-1670)
  • SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0 (CVE-2026-1670)
  • PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0 (CVE-2026-1670)
  • 25M IPC WDR_2MP_32M_PTZ_v2.0 (CVE-2026-1670)

A critical auth bypass flaw in Honeywell CCTV models could allow attackers to take over accounts, granting unauthorized access to live feeds. Many of these cameras are used in critical infrastructure, corporate sites, and government facilities worldwide. The flaw can be exploited remotely, risking sensitive surveillance data and enabling attackers to move laterally within networks, making it a severe threat to security, privacy, and operational integrity.

CISA advises organizations to reduce risk from this Honeywell CCTV flaw by isolating control system devices from the Internet, using firewalls, and placing remote devices behind secure networks. When remote access is needed, employ updated VPNs and ensure connected devices are secure. Organizations should perform risk assessments before deploying defenses, follow ICS security best practices from cisa.gov/ics, and report suspicious activity. Users should avoid phishing and unsolicited links; no active exploitation has been reported.

The US agency is not aware of attacks exploiting this flaw in the wild.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/188234/security/cisa-alerts-to-critical-auth-bypass-cve-2026-1670-in-honeywell-cctvs.html
如有侵权请联系:admin#unsafe.sh