Cyber Posture

CVE-2026-4272

High

Published: 05 April 2026

Published
05 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0003 10.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4272 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Https: (inferred from references). Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-18 (Wireless Access).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the missing authentication for critical functions by requiring identification and documentation of actions permitted without authentication, ensuring command execution requires proper authorization.

prevent

Establishes usage restrictions and security safeguards for wireless access, including Bluetooth, to prevent unauthorized remote connections to the scanner base station.

prevent

Requires device identification and authentication mechanisms for the scanner base station, blocking unauthenticated Bluetooth connections that enable remote command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Missing authentication enables unauthenticated exploitation of the base station's Bluetooth interface (T1210) to execute system commands on the connected host (T1059).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA. This vulnerability could allow a remote…

more

attacker within Bluetooth range of the scanner's base station has the capability to remotely execute system commands on the host connected to the base station without authentication. This issue has been assigned CVE-2026-4272 https://nvd.nist.gov/vuln/detail/CVE-2026-4272 and rated with a severity of High. Honeywell strongly recommends that users upgrade to the latest version identified to resolve the vulnerability.

Deeper analysisAI

CVE-2026-4272 is a Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners, enabling Authentication Abuse. It affects specific versions of the scanner base stations: C1 Base (Ingenic x1000) prior to GK000432BAA, D1 Base (Ingenic x1600) prior to HE000085BAA, and A1/B1 Base (IMX25) prior to BK000763BAA, BK000765BAA, or CU000101BAA. The issue stems from a lack of authentication mechanisms for critical functions, as documented in the National Vulnerability Database (NVD) with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) and mapped to CWE-306.

A remote attacker within Bluetooth range of the affected scanner's base station can exploit this vulnerability without authentication. Exploitation requires user interaction, allowing the attacker to remotely execute system commands on the host device connected to the base station. This grants high-impact confidentiality and integrity violations, potentially compromising the connected system.

Honeywell advisories, as referenced in the NVD entry (https://nvd.nist.gov/vuln/detail/CVE-2026-4272), strongly recommend upgrading to the latest firmware versions identified for each affected base station model to mitigate the vulnerability. No additional workaround details are provided in the available references.

Details

CWE(s)

Affected Products

Https:
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-20358Shared CWE-306
CVE-2025-13779Shared CWE-306
CVE-2026-22727Shared CWE-306
CVE-2026-27182Shared CWE-306
CVE-2025-14300Shared CWE-306
CVE-2026-41176Shared CWE-306
CVE-2025-21198Shared CWE-306
CVE-2025-65824Shared CWE-306
CVE-2026-4436Shared CWE-306
CVE-2025-27020Shared CWE-306

References