- CISA asks owners of Honeywell video surveillance cameras to patch their devices
- Critical security flaw affects a number of models
- Hackers could use this flaw to take over accounts and access camera feeds
Many Honeywell CCTV camera models are vulnerable to a critical severity flaw that could allow malicious actors to view feeds without authorization and, in some cases, even take control of vulnerable accounts, experts have warned.
In a new security advisory, the US Cybersecurity and Infrastructure Security Agency (CISA) said the affected cameras suffered from a “missing authentication for critical functions” flaw. It received a severity score of 9.8/10 (critical) and is now tracked as CVE-2026-1670.
“Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds,” CISA said, adding that an unauthenticated attacker could change the recovery email address and thus further compromise the target network.
Patch now or risk attack
Here is the list of affected models:
I-HIB2PI-UL 2MP IP 6.1.22.1216
SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0
PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0
25M IPC WDR_2MP_32M_PTZ_v2.0
As of press time, the flaw has not yet been added to CISA’s Catalog of Known Exploited Vulnerabilities (KEV), meaning there is no evidence of the flaw being exploited in the wild. However, many cybercriminals only begin searching for buggy equipment after a flaw is revealed, banking on victims’ lack of diligence in applying patches.
Given who Honeywell’s customers are (primarily industrial operators and critical infrastructure providers), it’s entirely possible that several groups will now begin actively searching for vulnerable systems.
The company offers numerous NDAA-compliant cameras suitable for deployment in government agencies. The models listed as vulnerable are apparently mid-tier solutions, typically found in mid-sized enterprise environments and warehouses.
In addition to patching, users are also advised to minimize network exposure for all control system devices, locate control system networks and remote devices behind firewalls and isolate them from corporate networks, and use secure networks (VPNs) when remote access is required. CISA also warns that not all VPNs are equal and businesses should be careful to choose the right one.
Via BeepComputer
The best antivirus for every budget
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




