Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras

Production line monitoring cameras made by Inaba can be hacked for surveillance and sabotage, but they remain unpatched.

Production line monitoring cameras made by Japanese company Inaba Denki Sangyo are affected by several potentially serious vulnerabilities that could be exploited for surveillance and sabotage, but they remain unpatched. 

Inaba Denki Sangyo manufactures air conditioning, electrical installation, and control system products.

Researchers at industrial and IoT security firm Nozomi Networks have analyzed the company’s Choco Tei Watcher Mini (IB-MCT001) camera, which is used to monitor plants for production disruptions and analyze incidents.

Nozomi researchers discovered that the camera is affected by four types of vulnerabilities, including critical issues related to weak password requirements and forced browsing, a high-severity issue related to the use of client-side authentication, and a medium-severity flaw related to the storage of passwords.

A remote, unauthenticated attacker can exploit the vulnerabilities to take full control of a device. An attacker could, for instance, covertly monitor live camera feeds (both video and audio).

“This could facilitate industrial espionage, allowing competitors or malicious actors to spy on proprietary manufacturing processes and gain insights into workflow optimizations, specialized machinery usage, or product assembly techniques. Additionally, it raises privacy concerns, as employees could be unknowingly monitored,” Nozomi explained, adding that “attackers could analyze security weaknesses, such as unattended machinery or shift changes, to plan further actions.”

The security firm also warned that the forced browsing vulnerability can be exploited to manipulate or delete footage. 

Advertisement. Scroll to continue reading.

“This could result in the loss of critical diagnostic footage, making it difficult to analyze and resolve operational inefficiencies, leading to prolonged downtime and increased costs. In industries that require stoppage recordings for quality control or regulatory compliance, missing or altered footage could result in production recalls,” Nozomi said. 

“Additionally, a malicious insider could erase or modify footage to conceal intentional disruptions, equipment failures, or workplace incidents, without being detected.”to conceal intentional disruptions, workplace incidents, or equipment failures,” it added.

The security firm reported its findings to Inaba, but patches have not been released. Instead, the vendor has urged customers to implement mitigations, such as restricting access to the cameras and protecting them with firewalls and other security systems. 

Advisories for the Inaba camera vulnerabilities have also been published by CISA and Japan’s JPCERT/CC

While Nozomi says that the impacted product is commonly found in Japanese plants, CISA’s advisory indicates that the cameras are deployed worldwide.

Learn More at SecurityWeek’s ICS Cybersecurity Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.
ICS Cybersecurity Conference
October 27-30, 2025 | Atlanta
www.icscybersecurityconference.com

Related: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

Related: Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Related: ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.