Security researchers at Claroty have published a new report warning of systemic cybersecurity risks being introduced into smart buildings and critical infrastructure through the adoption of the CEA-852 standard. The report from Claroty's Team82 research division explains that this standard, designed to bring legacy Building Management Systems (BMS) protocols like LonTalk onto modern IP networks, does so insecurely. The convergence of insecure-by-design legacy protocols with internet connectivity creates a perfect storm, exposing these systems to remote exploitation. Team82 discovered design flaws that allow remote attackers to compromise internet-exposed BMS gateways, which could grant them control over a building's entire operational ecosystem, including HVAC, lighting, and physical security systems, posing a significant physical safety and operational risk.
The Core Problem: The CEA-852 standard provides a way to tunnel legacy LonTalk protocol packets over IP networks. However, the standard and its common implementations lack fundamental security controls like authentication and encryption. This means that if a BMS gateway device using this standard is exposed to the internet, any attacker can communicate with it and the devices behind it.
Technical Weaknesses Discovered by Team82:
Affected Systems:
CEA-852 standard to connect LonTalk devices over an IP network.The compromise of a BMS can have severe consequences that bridge the cyber and physical worlds. An attacker gaining control of a BMS could:
The systemic risk arises because these systems are deployed across a vast range of critical sectors, including commercial buildings, airports, hospitals, and data centers. A single, widespread vulnerability could be exploited at scale.
Hunting for these systems requires looking for signs of their exposure and communication protocols.
| Type | Value | Description |
|---|---|---|
port |
1628/UDP, 1629/UDP |
Default ports used by the LonTalk/IP protocol (CEA-852). Any traffic on these ports from the internet is a critical finding. |
url_pattern |
Shodan search: 'LonTalk' |
Use internet scanning services to proactively search for devices exposing LonTalk or related BMS protocols associated with your organization's IP space. |
network_traffic_pattern |
Traffic between IT and BMS subnets |
Any un-firewalled communication between the corporate IT network and the dedicated BMS network is a high-risk configuration. |
log_source |
Firewall Logs |
Search for any allowed or blocked traffic on ports 1628 and 1629 to identify misconfigurations or scanning attempts. |
D3-VSS: Vulnerability Scan Scrutiny)D3-NTA: Network Traffic Analysis)Immediate Actions:
M1030 - Network Segmentation)Strategic Recommendations:
The most effective control is to segment the BMS network from the corporate IT network and the internet, preventing direct access.
Keep BMS gateway and server firmware and software patched to protect against known vulnerabilities.
Harden the configuration of BMS servers and gateways, disabling unnecessary services and ports.
The findings on the CEA-852 standard underscore the critical need for network isolation. Building Management Systems, like other OT environments, were not designed with internet threats in mind. Therefore, the primary defense is to ensure they are never directly exposed. All BMS devices, including gateways, servers, and controllers, must be placed on a physically or virtually segregated network. This network should be protected by a firewall with a default-deny policy, allowing only explicitly defined and necessary communication with a small set of management workstations. This 'castle-and-moat' approach is the most effective way to prevent attackers from exploiting the inherent insecurities of protocols like LonTalk over IP.
For the BMS servers and gateways that bridge the legacy protocols to the IP network, platform hardening is crucial. Even behind a firewall, these devices present a risk. Hardening measures should include: changing all default passwords, disabling unused ports and services (e.g., web interfaces, FTP), updating firmware to the latest version, and restricting administrative access to a specific IP range or jump host. For organizations with mature capabilities, application whitelisting can be deployed on BMS servers to prevent any unauthorized executables from running. This layered defense reduces the attack surface of the most critical components in the BMS architecture.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats