Smart Buildings, Dumb Security: Claroty Warns New Standard Exposes BMS to Remote Attack

Claroty's Team82 Reveals Systemic Risk in Building Management Systems from CEA-852 Standard

MEDIUM
April 11, 2026
5m read
VulnerabilityIndustrial Control SystemsIoT Security

Related Entities

Organizations

Claroty Team82EnOceanLoytec

Products & Tech

LonTalkBACnetModbus

Full Report

Executive Summary

Security researchers at Claroty have published a new report warning of systemic cybersecurity risks being introduced into smart buildings and critical infrastructure through the adoption of the CEA-852 standard. The report from Claroty's Team82 research division explains that this standard, designed to bring legacy Building Management Systems (BMS) protocols like LonTalk onto modern IP networks, does so insecurely. The convergence of insecure-by-design legacy protocols with internet connectivity creates a perfect storm, exposing these systems to remote exploitation. Team82 discovered design flaws that allow remote attackers to compromise internet-exposed BMS gateways, which could grant them control over a building's entire operational ecosystem, including HVAC, lighting, and physical security systems, posing a significant physical safety and operational risk.


Vulnerability Details

The Core Problem: The CEA-852 standard provides a way to tunnel legacy LonTalk protocol packets over IP networks. However, the standard and its common implementations lack fundamental security controls like authentication and encryption. This means that if a BMS gateway device using this standard is exposed to the internet, any attacker can communicate with it and the devices behind it.

Technical Weaknesses Discovered by Team82:

  • Lack of Authentication: The protocol itself has no concept of authentication. Any device that can reach the gateway can send it valid LonTalk commands.
  • Traffic Manipulation: An attacker can intercept, modify, or inject malicious LonTalk packets to control end devices (e.g., turn off lights, change HVAC setpoints).
  • Remote Exploitation: The researchers found vulnerabilities in the gateway devices themselves that could be triggered by malformed packets, potentially leading to remote code execution on the gateway.

Affected Systems:

  • Any Building Management System that uses the CEA-852 standard to connect LonTalk devices over an IP network.
  • Specific vendors mentioned as part of the ecosystem include EnOcean and Loytec.
  • Gateway devices that bridge multiple protocols (e.g., LonTalk, BACnet, Modbus) are especially high-risk, as their compromise provides a pivot point into multiple building control systems.

Impact Assessment

The compromise of a BMS can have severe consequences that bridge the cyber and physical worlds. An attacker gaining control of a BMS could:

  • Cause Physical Disruption: Shut down HVAC systems in a data center, causing servers to overheat and fail. Disable lighting in a hospital, creating a safety hazard. Unlock all doors controlled by the security system.
  • Increase Operating Costs: Manipulate HVAC and lighting to run at maximum capacity, driving up utility bills.
  • Facilitate Espionage: Disable security cameras or access controls to allow for physical intrusion.
  • Create a Pivot Point: A compromised BMS, often managed by facilities staff and not IT security, can serve as an unmonitored pivot point for attackers to move into the corporate IT network.

The systemic risk arises because these systems are deployed across a vast range of critical sectors, including commercial buildings, airports, hospitals, and data centers. A single, widespread vulnerability could be exploited at scale.


Cyber Observables for Detection

Hunting for these systems requires looking for signs of their exposure and communication protocols.

Type Value Description
port 1628/UDP, 1629/UDP Default ports used by the LonTalk/IP protocol (CEA-852). Any traffic on these ports from the internet is a critical finding.
url_pattern Shodan search: 'LonTalk' Use internet scanning services to proactively search for devices exposing LonTalk or related BMS protocols associated with your organization's IP space.
network_traffic_pattern Traffic between IT and BMS subnets Any un-firewalled communication between the corporate IT network and the dedicated BMS network is a high-risk configuration.
log_source Firewall Logs Search for any allowed or blocked traffic on ports 1628 and 1629 to identify misconfigurations or scanning attempts.

Detection Methods

  • Asset Discovery: The first step is to know what you have. Use network scanning tools (like Nmap) and specialized OT/IoT discovery tools to identify all BMS devices on your network. Pay close attention to devices communicating on the ports listed above.
  • Vulnerability Scanning: Conduct regular vulnerability scans of your external-facing IP ranges to identify any exposed BMS gateways or servers. (D3FEND Technique: D3-VSS: Vulnerability Scan Scrutiny)
  • Network Monitoring: Implement network traffic analysis to baseline normal BMS traffic. Alert on any new devices, unusual communication patterns, or attempts to communicate with BMS devices from outside the authorized management network. (D3FEND Technique: D3-NTA: Network Traffic Analysis)

Remediation Steps

Immediate Actions:

  1. Isolate BMS Networks: The most critical step is to ensure that the Building Management System network is not directly accessible from the internet. Place all BMS devices on a segregated network segment behind a firewall. (MITRE Mitigation: M1030 - Network Segmentation)
  2. Use VPNs for Remote Access: If remote access is required for building engineers or third-party vendors, it must be done through a secure VPN with multi-factor authentication. Access should be granular and logged.
  3. Apply Patches: Work with your BMS vendor to apply any available security patches for gateway devices and servers.

Strategic Recommendations:

  • Procurement Language: Update procurement contracts to require that all new BMS and OT systems support modern security standards, including authentication, encryption, and secure-by-default configurations.
  • Cross-Functional Collaboration: Foster collaboration between IT, cybersecurity, and facilities management teams. Ensure that the cybersecurity team has visibility into and authority over the security of the BMS network.
  • Compensating Controls: For legacy systems that cannot be patched or replaced, implement compensating controls such as network isolation, intrusion detection systems, and application whitelisting to protect them.

Timeline of Events

1
April 11, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective control is to segment the BMS network from the corporate IT network and the internet, preventing direct access.

Keep BMS gateway and server firmware and software patched to protect against known vulnerabilities.

Harden the configuration of BMS servers and gateways, disabling unnecessary services and ports.

D3FEND Defensive Countermeasures

The findings on the CEA-852 standard underscore the critical need for network isolation. Building Management Systems, like other OT environments, were not designed with internet threats in mind. Therefore, the primary defense is to ensure they are never directly exposed. All BMS devices, including gateways, servers, and controllers, must be placed on a physically or virtually segregated network. This network should be protected by a firewall with a default-deny policy, allowing only explicitly defined and necessary communication with a small set of management workstations. This 'castle-and-moat' approach is the most effective way to prevent attackers from exploiting the inherent insecurities of protocols like LonTalk over IP.

For the BMS servers and gateways that bridge the legacy protocols to the IP network, platform hardening is crucial. Even behind a firewall, these devices present a risk. Hardening measures should include: changing all default passwords, disabling unused ports and services (e.g., web interfaces, FTP), updating firmware to the latest version, and restricting administrative access to a specific IP range or jump host. For organizations with mature capabilities, application whitelisting can be deployed on BMS servers to prevent any unauthorized executables from running. This layered defense reduces the attack surface of the most critical components in the BMS architecture.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BMSBuilding Management SystemClarotyLonTalkIoT SecurityOT SecurityVulnerability

📢 Share This Article

Help others stay informed about cybersecurity threats