Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras

Production line monitoring cameras made by Inaba can be hacked for surveillance and sabotage, but they remain unpatched.

Production line monitoring cameras made by Japanese company Inaba Denki Sangyo are affected by several potentially serious vulnerabilities that could be exploited for surveillance and sabotage, but they remain unpatched. 

Inaba Denki Sangyo manufactures air conditioning, electrical installation, and control system products.

Researchers at industrial and IoT security firm Nozomi Networks have analyzed the company’s Choco Tei Watcher Mini (IB-MCT001) camera, which is used to monitor plants for production disruptions and analyze incidents.

Nozomi researchers discovered that the camera is affected by four types of vulnerabilities, including critical issues related to weak password requirements and forced browsing, a high-severity issue related to the use of client-side authentication, and a medium-severity flaw related to the storage of passwords.

A remote, unauthenticated attacker can exploit the vulnerabilities to take full control of a device. An attacker could, for instance, covertly monitor live camera feeds (both video and audio).

“This could facilitate industrial espionage, allowing competitors or malicious actors to spy on proprietary manufacturing processes and gain insights into workflow optimizations, specialized machinery usage, or product assembly techniques. Additionally, it raises privacy concerns, as employees could be unknowingly monitored,” Nozomi explained, adding that “attackers could analyze security weaknesses, such as unattended machinery or shift changes, to plan further actions.”

The security firm also warned that the forced browsing vulnerability can be exploited to manipulate or delete footage. 

“This could result in the loss of critical diagnostic footage, making it difficult to analyze and resolve operational inefficiencies, leading to prolonged downtime and increased costs. In industries that require stoppage recordings for quality control or regulatory compliance, missing or altered footage could result in production recalls,” Nozomi said. 

“Additionally, a malicious insider could erase or modify footage to conceal intentional disruptions, equipment failures, or workplace incidents, without being detected.”to conceal intentional disruptions, workplace incidents, or equipment failures,” it added.

Advertisement. Scroll to continue reading.

The security firm reported its findings to Inaba, but patches have not been released. Instead, the vendor has urged customers to implement mitigations, such as restricting access to the cameras and protecting them with firewalls and other security systems. 

Advisories for the Inaba camera vulnerabilities have also been published by CISA and Japan’s JPCERT/CC

While Nozomi says that the impacted product is commonly found in Japanese plants, CISA’s advisory indicates that the cameras are deployed worldwide.

Learn More at SecurityWeek’s ICS Cybersecurity Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.
ICS Cybersecurity Conference
October 27-30, 2025 | Atlanta
www.icscybersecurityconference.com

Related: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

Related: Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Related: ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.