April 11, 2026 Cyber Trends
A critical Honeywell CCTV vulnerability, CVE-2026-1670, can enable account takeover and unauthorized camera access. Learn the risk, affected models, and the security steps organizations should take now.
A newly disclosed vulnerability affecting multiple Honeywell CCTV products is another reminder that surveillance systems are not just physical security assets. They are networked endpoints. When those endpoints are exposed, weakly segmented, or poorly maintained, they can become entry points for broader compromise. In this case, the issue is tracked as CVE-2026-1670, and the vulnerability is severe enough that CISA issued an industrial control systems advisory warning organizations to act.
Despite some headlines framing this as a password-cracking problem, the more accurate issue is worse from a control standpoint: this is a missing authentication for a critical function. According to the NVD and CISA’s advisory data, the affected products expose an unauthenticated API endpoint that can allow an attacker to remotely change the “forgot password” recovery email address. That creates a direct path to account takeover without requiring valid credentials first.
What Is CVE-2026-1670?
CVE-2026-1670 is a critical vulnerability in certain Honeywell CCTV camera products. NVD lists the flaw as CWE-306: Missing Authentication for Critical Function, and the ICS-CERT scoring attached to the CVE assigns it a CVSS v3.1 base score of 9.8 (Critical). The advisory states that successful exploitation could lead to account takeovers and unauthorized access to camera feeds, with the possibility of further network compromise after the attacker changes the recovery email tied to the account.
That matters because once an attacker controls a surveillance account, the consequences extend beyond privacy. A compromised camera platform can expose facility operations, blind defenders during an incident, reveal internal movement patterns, and provide attackers with an additional foothold inside the environment. That is why connected security devices should be treated as part of the cyber attack surface, not as isolated building infrastructure. This is an inference based on the account takeover and camera access impacts described by CISA and NVD.
Affected Honeywell CCTV Models
CISA’s advisory data identifies four affected Honeywell product/version combinations: I-HIB2PI-UL 2MP IP 6.1.22.1216, SMB NDAA MVO-3 WDR_2MP_32M_PTZ_v2.0, PTZ WDR 2MP 32M WDR_2MP_32M_PTZ_v2.0, and 25M IPC WDR_2MP_32M_PTZ_v2.0.
The CISA advisory also classifies the affected deployment context under Commercial Facilities and notes worldwide deployment. That means this issue is not limited to one niche environment. Any organization using these devices in offices, warehouses, campuses, or other operational sites should assume the risk is relevant until those systems are verified and remediated.
Is This Being Exploited?
As of CISA’s published advisory, no known public exploitation specifically targeting this vulnerability had been reported to CISA. That does not reduce the urgency. Public disclosure often accelerates scanning and opportunistic exploitation, especially for internet-exposed devices and edge-connected systems that are slow to patch.
From an InfoSight perspective, this is exactly where organizations make costly mistakes: they treat “not yet exploited” as “low priority.” That is backwards. Once a weakness is public, the window between disclosure and attacker weaponization can be short. Security teams should use that window to reduce exposure immediately, even before a full patch cycle is completed.
What Organizations Should Do Now
CISA’s guidance is direct. Organizations should minimize network exposure for control system devices, ensure they are not accessible from the internet, place control system networks and remote devices behind firewalls, and isolate them from business networks. When remote access is necessary, CISA recommends using more secure methods such as VPNs, while recognizing that VPNs also need to be fully updated and only protect as much as the connected device itself is secure.
CISA also states that organizations should perform proper impact analysis and risk assessment before deploying defensive measures, and Honeywell users are directed to contact Honeywell support for patch information.
At the operational level, the immediate priorities are straightforward:
Identify whether any affected Honeywell models are present in the environment.
Confirm whether any of those cameras are externally reachable.
Restrict internet exposure and unnecessary remote administration paths.
Segment surveillance devices from core business systems.
Review account recovery and administrative access paths tied to camera management.
Increase monitoring for unusual account changes, authentication anomalies, and access to video feeds.
Coordinate with the vendor to obtain remediation guidance and validate patch status.
The Real Security Lesson
The bigger issue is not just one Honeywell CCTV vulnerability. The bigger issue is how many organizations still treat cameras, badge systems, sensors, and similar connected devices as outside the normal scope of cybersecurity governance. That gap is exactly what attackers exploit.
A camera may look like a facilities asset, but it still has firmware, authentication logic, network connectivity, remote management, and privileged visibility into the environment. If it is reachable, unmanaged, or weakly segmented, it belongs in your vulnerability management program. It should be inventoried, monitored, patched, and reviewed under the same discipline applied to servers, firewalls, and user endpoints.
InfoSight’s View
At InfoSight, the takeaway is clear: organizations need to stop separating physical security technology from cyber risk management. Incidents like CVE-2026-1670 show how easily an overlooked device class can become a control failure with enterprise-wide implications.
This is why effective cyber programs focus on more than patching alone. They require asset visibility, segmentation, secure remote access, vendor risk coordination, and continuous monitoring of exposed systems. When a flaw allows unauthenticated account manipulation, the root problem is not just outdated firmware. It is governance around exposure, access, and security architecture.
The organizations that respond best will not just patch the vulnerable cameras. They will use this event to audit their entire connected-device footprint, reduce unnecessary exposure, and close the gap between IT, OT, and physical security operations.
Bottom Line
CVE-2026-1670 is a critical Honeywell CCTV vulnerability that can enable account takeover and unauthorized access to surveillance feeds through an unauthenticated password recovery path. The affected products should be treated as high-priority remediation targets, especially where cameras are internet-accessible or connected to sensitive operational environments. CISA’s guidance is clear: reduce exposure, isolate the devices, secure remote access, assess impact, and move quickly.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.