Team82 Logo Claroty
Return to Team82 Research

Examining the Legacy BMS LonTalk Protocol

/

Team82 explores the LonTalk networking protocol which is often optimized for control applications within building management and automation systems. We will examine the protocol’s fundamentals and trace its evolution from serial communication to IP-based deployments.

LonTalk Under the Covers of BMS

The LonTalk networking protocol, developed in the early 1990s, was once a popular staple in device-to-device communication, especially for building automation and building management systems (BAS and BMS). Today in many implementations, it has been replaced by BACnet, a more modern and secure open standard that enables communication between smart building assets manufactured by a diverse set of vendors. LonTalk, however, still exists deep under the covers of many proprietary BMS implementations. 

As with any proprietary deployment of protocols such as LonTalk, there may be undocumented security issues that could pose a risk to organizations. Those risks are especially worrisome as more and more BMS are being connected to IP networks, and managed on the network and via the cloud. Organizations will have to contend with a new host of vulnerabilities and configurations being introduced as a side effect of this connectivity. 

Therefore, despite its age, LonTalk should not be underestimated as an attack vector for hacktivists and criminal entities, especially as BMS is enabled over IP networks. LonTalk is certainly still relevant to BMS cybersecurity discussions, especially as BMS finds its way online for a number of strategic and bottom-line reasons. Commercial real estate, retail, hospitality, and data center sectors rely on BMS systems such as HVAC (heating, ventilation, and air conditioning), lighting, energy management and security. Previously, these systems were operated independently by facility management, but they are now increasingly connected and integrated through advanced BMS and BAS capabilities.

BMS and BAS can also be linked to other smart, connected sensors and devices within a facility. These systems generate analytics data that can be reviewed to monitor energy consumption trends and meet certain regulatory standards around environmental controls and sustainability. Some organizations are realizing not only efficiency improvements, especially across multiple sites, but are also able to tweak processes in order to cut utility costs and other hits against the bottom line. 

Any disruption to these essential services because of a security issue in a decades-old legacy protocol is unacceptable, and is driving Team82’s current research initiative around LonTalk and BMS security weaknesses overall. In this blog, we will examine the LonTalk protocol and provide an overview of its versatility, use cases, and the security implications of its transition from serial connectivity to the IP layer.

What is the LonTalk Protocol for BMS?

Developed by the Echelon Corp., of Massachusetts, LonTalk is standardized as CEA-709, also known as ISO/IEC 14908 which enables devices to communicate over CEA-709 networks. LonTalk’s introduction provided a vendor-neutral solution for building automation systems at a time when these systems were proprietary, isolated, and communicated over serial connections.

Many legacy LonTalk systems, including sensors and controllers, rely on dedicated integrated circuits called Neuron Chips to implement the physical, network, and application layers of the LonTalk protocol in hardware. The chip combines three local processors (applications, network management, and packet I/O), an architecture that enables LonWorks devices to communicate, process control logic, and handle network services independently, without relying on external microcontrollers. As Echelon’s company lineage changed several times through acquisitions, the Neuron Chip line was officially declared end-of-life in 2025, marking the end of dedicated LonTalk silicon. 

LonTalk functionality continues, however, through EnOcean software stacks and network interface products. Modern systems may integrate legacy LonWorks networks into contemporary IoT and edge architectures. EnOcean manages tools for Lon functionality, as well as the interface hardware connecting LonTalk devices to IoT and edge infrastructures. LonMark, meanwhile, maintains the LonTalk and LonWorks standards, including SNVT management, device certification, and interoperability guidelines.

LonTalk Protocol Overview

The LonTalk protocol is versatile, capable of operating over multiple physical topologies using media such as twisted pair wiring, power lines, and radio frequency. Later implementations standardized LonTalk over IP through the CEA-852 standard.

Hierarchical structure of a LonWorks control network.

Beyond data exchange, LonTalk provides network management and diagnostic services, enabling integrators to commission devices, assign addresses, monitor node status, and clear error logs directly through the protocol. 

Here is an example of LonTalk CEA-709 network diagnostic and management packet type codes:

LonTalk CEA-709 packet type codes from the LtNetworkManagerLit.h file in EnOcean’s official LonTalk Stack SDK repository on GitHub. Message type groups are highlighted in red.

The screenshot above shows an example of LonTalk network diagnostics, network management, and router configuration packet type codes, as defined in the LtNetworkManagerLit.h file from EnOcean’s official LonTalk Stack SDK repository on GitHub.

Together, these features make LonTalk not just a communication protocol, but a comprehensive framework for maintaining and controlling complex automation networks.

Further details on the legacy LonTalk protocol, its implementation, supported network topologies, and practical applications, can be found in the LonTalk Protocol Specification published by Echelon.

LonTalk Use Cases

A typical use case might involve coordinating Heating, Ventilation, and Air Conditioning (HVAC) controllers, lighting dimmers, and occupancy sensors from different manufacturers on a single LonWorks network without custom integration. Thanks to its wide adoption and long lifespan, LonTalk remains common in existing infrastructures where full system replacement is costly. Today, it continues to bridge legacy installations with modern IP-based BMS solutions, ensuring continuity and smooth migration to newer standards.

In a LonTalk network, devices exchange information using Network Variables (NVs), which are shared data points representing values such as temperature, fan speed, occupancy and more. There are two types of NVs:

  • NVO (Network Variable Output): used to send or publish data to the network.

  • NVI (Network Variable Input): used to receive or subscribe to data from the network.

Each NV is based on a Standard Network Variable Type (SNVT), a predefined data type that ensures consistent interpretation of values across devices from different manufacturers (the full list of SNVTs is available in the official LonMark SNVT Master List).

An illustration showing the temperature value being read from the HVAC controller and sent to the BMS server, while the desired setpoint temperature is transmitted from the BMS back to the HVAC system.


In the image above, we can see a simple example where the current temperature is sent from the HVAC controller to the BMS server, while the new temperature setpoint, controlled by the BMS, is sent back to the HVAC system.

The following table illustrates how Network Variables (NVs) are used to exchange data between an HVAC controller and a BMS server in a LonTalk network.

Step

Device

NV Name

Direction

SNVT Type

Description

1

HVAC

nvoRoomTemp

Output (NVO)

SNVT_temp_p

Current room temperature in °C (for example, 22.5°C).

BMS server

nvoRoomTemp

Input
(NVI)

2

HVAC

nviSetpoint

Input
(NVI)

SNVT_temp_p

Desired temperature setpoint in °C  from the BMS (for example, 25°C).

BMS server

nvoSetpoint

Output
(NVO)

 

The HVAC device publishes the current room temperature using the network variable nvoRoomTemp, which is defined as SNVT_temp_p (a standard temperature type in °C). The BMS server subscribes to this variable through its nviRoomTemp input to monitor the actual room temperature, for instance, 22.5°C.

Conversely, the BMS server sends the desired temperature setpoint using nvoSetpoint, also of type SNVT_temp_p, while the HVAC controller receives it via nviSetpoint. This allows the HVAC to adjust its operation to match the target temperature, for example 25.0°C.

Transition to IP Layer (CEA-852)

The transition of LonTalk-over-IP (operating over both TCP and UDP) significantly improves flexibility and interoperability, it also introduces new security considerations. Exposing LonTalk over IP expands the attack surface and introduces common IP-network risks, including unauthorized access, traffic manipulation, and remote exploitation in the absence of proper security controls.

The transition of the legacy LonTalk protocol to the IP layer has significant implications for its applicability. By removing the dependency on the proprietary Neuron chip,  LonTalk can now be implemented more flexibly and deployed across a broader range of platforms. Beyond replicating the core features of the original protocol, the IP-based standard introduces enhanced capabilities such as device registration and configuration, channel and membership management, and channel statistics monitoring.

In addition, the specification defines vendor-specific packet types that extend control and configuration beyond the baseline CEA-852 standard. These privileged commands enable authorized users to manage gateway devices, which often support multiple protocols and whose configuration may influence the entire BMS network. The following sections provide a deeper look at CEA-852 proprietary packet types, exploring how vulnerabilities can be exploited and examining general implementation drawbacks.

Exploring these extended capabilities and management paths, as well as identifying potential bypasses and vulnerabilities, is both technically valuable and strategically important.

To make LonTalk more accessible to developers, EnOcean has released an official GitHub repository containing the LonTalk protocol stack source code for both client and server implementations of the IP-852 standard (explained in detail in the Exploring the CEA-852 Standard section). These sources are compiled into the core libraries that manage LonTalk communication within EnOcean’s i.LON and SmartServer product lines, following EnOcean’s acquisition of Echelon’s product line.

Images of Echelon BMS gateway devices: legacy i.LON (top) and SmartServer (above).

Internet-Exposed LonTalk Controller Devices

When conducting a quick search for Internet-accessible LonTalk devices using the CENSYS service, we identified a significant number of exposed controllers, both EnOcean (formerly Echelon) and Loytec devices, that are directly connected to the Internet. Further analysis revealed that many of these devices expose the CEA-852 LonTalk-over-IP service on its default ports (1628 and 1629). In addition, a large portion of these controllers either rely on default MD5 keys when signature-based protection is enabled or do not implement any security mechanisms at all.

CENSYS searches for Internet-exposed LonTalk controllers: Echelon devices (left), with 1,027 exposed instances identified, and Loytec devices (right), with 216 exposed instances identified.

Moving LonTalk to the IP layer with CEA-852 makes BMS networks more flexible and easier to integrate, but also opens new security risks through vendor-specific commands. In future reports, we’ll take a closer look at real-world EnOcean and Loytec gateway controllers, examining how these packets operate and uncovering potential weak spots in CEA-852 implementations within modern BMS deployments.

Amir Zaltzman

Vulnerability Researcher

Amir Zaltzman is a vulnerability researcher on Team82.

Stay in the know Get the Team82 Newsletter
Recent Vulnerability Disclosures
Claroty
LinkedIn Twitter YouTube Facebook