{"api_version":"1","generated_at":"2026-05-15T05:22:30+00:00","cve":"CVE-2026-4272","urls":{"html":"https://cve.report/CVE-2026-4272","api":"https://cve.report/api/cve/CVE-2026-4272.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-4272","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-4272"},"summary":{"title":"CVE-2026-4272 - Bluetooth Remote Execution of System Commands Vulnerability","description":"Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA.\n\nThis vulnerability could allow a remote attacker within Bluetooth range of the scanner's base station has the capability to remotely execute system commands on the host connected to the base station without authentication. This issue has been assigned  CVE-2026-4272 https://nvd.nist.gov/vuln/detail/CVE-2026-4272  and rated with a severity of High. Honeywell strongly recommends that users upgrade to the latest version identified to resolve the vulnerability.","state":"PUBLISHED","assigner":"Honeywell","published_at":"2026-04-05 22:16:01","updated_at":"2026-04-07 13:20:35"},"problem_types":["CWE-306","CWE-306 CWE-306 Missing Authentication for Critical Function"],"metrics":[{"version":"3.1","source":"psirt@honeywell.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://https://nvd.nist.gov/vuln/detail/CVE-2026-4272","name":"https://https://nvd.nist.gov/vuln/detail/CVE-2026-4272","refsource":"psirt@honeywell.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-4272","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4272","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Honeywell","product":"Barcode Scanners","version":"affected C1 Base(Ingenic x1000) GK000432BAA custom","platforms":[]},{"source":"CNA","vendor":"Honeywell","product":"Barcode Scanners","version":"affected D1 Base(Ingenic x1600) HE000085BAA custom","platforms":[]},{"source":"CNA","vendor":"Honeywell","product":"Barcode Scanners","version":"affected A1/B1 Base(IMX25) BK000763BAA_BK000765BAA_CU000101BAA custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Kaspersky","lang":"en"},{"source":"CNA","value":"Haidar Kabibo","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"4272","cve":"CVE-2026-4272","epss":"0.001090000","percentile":"0.291690000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:38"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-4272","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-06T14:00:57.144252Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-06T14:01:35.115Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Barcode Scanners","vendor":"Honeywell","versions":[{"lessThan":"GK000432BAA","status":"affected","version":"C1 Base(Ingenic x1000)","versionType":"custom"},{"lessThan":"HE000085BAA","status":"affected","version":"D1 Base(Ingenic x1600)","versionType":"custom"},{"lessThan":"BK000763BAA_BK000765BAA_CU000101BAA","status":"affected","version":"A1/B1 Base(IMX25)","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Kaspersky"},{"lang":"en","type":"finder","value":"Haidar Kabibo"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.<p>This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA.</p>This vulnerability could allow a remote attacker within Bluetooth range of the scanner's base station has the capability to remotely execute system commands on the host connected to the base station without authentication. This issue has been assigned&nbsp;<a href=\"https://nvd.nist.gov/vuln/detail/CVE-2026-4272\">CVE-2026-4272</a> and rated with a severity of High. Honeywell strongly recommends that users upgrade to the latest version identified to resolve the vulnerability.<br><br><br>"}],"value":"Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA.\n\nThis vulnerability could allow a remote attacker within Bluetooth range of the scanner's base station has the capability to remotely execute system commands on the host connected to the base station without authentication. This issue has been assigned  CVE-2026-4272 https://nvd.nist.gov/vuln/detail/CVE-2026-4272  and rated with a severity of High. Honeywell strongly recommends that users upgrade to the latest version identified to resolve the vulnerability."}],"impacts":[{"capecId":"CAPEC-114","descriptions":[{"lang":"en","value":"CAPEC-114 Authentication Abuse"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-05T22:00:27.141Z","orgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","shortName":"Honeywell"},"references":[{"url":"https://https://nvd.nist.gov/vuln/detail/CVE-2026-4272"}],"source":{"discovery":"UNKNOWN"},"title":"CVE-2026-4272 - Bluetooth Remote Execution of System Commands Vulnerability","x_generator":{"engine":"Vulnogram 0.5.0"}}},"cveMetadata":{"assignerOrgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","assignerShortName":"Honeywell","cveId":"CVE-2026-4272","datePublished":"2026-04-05T22:00:27.141Z","dateReserved":"2026-03-16T14:45:35.186Z","dateUpdated":"2026-04-06T14:01:35.115Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-05 22:16:01","lastModifiedDate":"2026-04-07 13:20:35","problem_types":["CWE-306","CWE-306 CWE-306 Missing Authentication for Critical Function"],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"4272","Ordinal":"1","Title":"CVE-2026-4272 - Bluetooth Remote Execution of System Commands Vu","CVE":"CVE-2026-4272","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"4272","Ordinal":"1","NoteData":"Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA.\n\nThis vulnerability could allow a remote attacker within Bluetooth range of the scanner's base station has the capability to remotely execute system commands on the host connected to the base station without authentication. This issue has been assigned  CVE-2026-4272 https://nvd.nist.gov/vuln/detail/CVE-2026-4272  and rated with a severity of High. Honeywell strongly recommends that users upgrade to the latest version identified to resolve the vulnerability.","Type":"Description","Title":"CVE-2026-4272 - Bluetooth Remote Execution of System Commands Vu"}]}}}