- CISA asks Honeywell CCTV camera owners to patch their devices
- A critical security flaw affects several models
- Hackers could use the flaw to take over accounts and access camera feeds.
Several models of Honeywell CCTV cameras are accused of being vulnerable to a critical flaw that could allow threat actors to view streams without authorization and, in some cases, even take over vulnerable accounts, experts warned.
In a new security advisory, the US Cybersecurity and Infrastructure Security Agency (CISA) said the affected cameras were plagued by a “lack of authentication for critical functions” flaw. It was assigned a severity score of 9.8/10 (critical) and is now tracked as CVE-2026-1670.
“Successful exploitation of this vulnerability could lead to account takeover and unauthorized access to camera feeds,” CISA said, adding that an unauthenticated attacker could change the recovery email address and thus further compromise the target network.
Patch now or risk an attack
Here is the list of affected models:
I-HIB2PI-UL 2MP IP 6.1.22.1216
SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0
PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0
25M IPC WDR_2MP_32M_PTZ_v2.0
At the time of this publication, the flaw has not yet been added to CISA’s catalog of known exploited vulnerabilities (KEV), meaning there are no records of the bug being exploited in the wild. However, many cybercriminals only start searching for faulty computers after a flaw is revealed, betting that victims will not be diligent about patching.
Given who Honeywell’s customers are (mostly industrial operators and critical infrastructure providers), it’s entirely possible that several groups will now begin actively scanning for vulnerable systems.
The company offers many NDAA-compliant cameras, suitable for deployment in government agencies. Models listed as vulnerable are apparently mid-level solutions, typically found in mid-sized business and warehouse environments.
In addition to patching, users are also encouraged to minimize network exposure for all control system devices, place control system networks and remote devices behind firewalls and isolate them from business networks, and use secure networks (VPNs) when remote access is required. CISA also warns that not all VPNs are the same and that companies should be careful when choosing the right one.
Through beepcomputer
The best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to receive news, reviews and opinions from our experts in your feeds. Be sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp also.




