Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

Samsung SmartThings Hub & Swann Camera Security Breaches: What Enterprises Need to Know About IoT Risks

Samsung SmartThings Hub & Swann Camera Security Breaches: What Enterprises Need to Know About IoT Risks Swann Security’s app has proven vulnerable to hacking.

On Thursday, security researchers uncovered flaws in the firmware of Samsung’s SmartThings Hub. Cisco Talos released a detailed blog outlining multiple critical vulnerabilities. According to Jeremy Cowan, this is part of a broader trend of IoT security weaknesses that is raising alarm among businesses planning future IIoT deployments.

Talos Identifies SmartThings Hub Vulnerability

Cisco Talos has collaborated with Samsung to patch the issues and has rolled out a firmware update for affected customers. The SmartThings Hub serves as a central controller, allowing users to monitor and manage a wide array of IoT devices—light bulbs, HVAC systems, door locks, and more—directly from their smartphones. The firmware, which runs on a Linux kernel, supports communication over Ethernet, Zigbee, Z‑Wave, and Bluetooth.

The discovered flaws could enable an attacker to execute operating‑system commands or run arbitrary code on the hub. While Samsung has addressed the vulnerabilities, a Talos spokesperson described the risks as “quite severe.”

Because these devices often collect sensitive data, the weaknesses could let an attacker gain control over home or business systems, or even cause physical damage. Potential impacts include:

Swann Smart Security Camera Breach

Earlier this week, reports emerged that Swann’s popular wireless security cameras could be hijacked, allowing attackers to access video and audio streams. The issue was identified after the BBC highlighted a case where a customer received another property’s recordings.

Swann confirmed that the flaw is limited to a single model, the SWWHD‑Intcam (also known as the Swann Smart Security Camera). According to Adam Brown, security solutions manager at California‑based Synopsys, the camera’s firmware contained hard‑coded passwords and lacked proper network isolation—practices that expose users to external surveillance.

Brown emphasized that the camera market is evolving, with leading manufacturers integrating robust privacy and security controls. For devices that serve as security solutions themselves, strong protection is essential.

Security Tops the List for IIoT Adoption

It is unsurprising that security remains the top concern for businesses exploring industrial IoT. The 2018 SANS Institute Industrial IoT Security Survey Report confirmed that enterprises fear the potential risks of connected devices the most.

Samsung SmartThings Hub & Swann Camera Security Breaches: What Enterprises Need to Know About IoT Risks

Dean Ferrando, systems engineer manager at Tripwire, notes that the proliferation of connected devices amplifies risk. “Manufacturers often ship products with minimal security,” he says. “It is critical that developers integrate security into the software from the outset to eliminate flaws.”

Ferrando further stresses that when connected devices can enact material changes in the physical world, safety and life become paramount. “Industrial organizations must adopt a comprehensive security hygiene strategy—educating staff and investing in proven technologies—to stay ahead of cyber threats.”

Samsung SmartThings Hub & Swann Camera Security Breaches: What Enterprises Need to Know About IoT Risks

The author of this article is
Jeremy Cowan (pictured left),
editorial director of IoT Now
and VanillaPlus.

Internet of Things Technology

  1. How IoT Is Mitigating Security Risks in the Oil & Gas Industry
  2. Secure IoT: Best Practices for Building Trustworthy Connected Products
  3. How IoT Hackers Drive Innovation—and Keep Us Safe
  4. Can Security and Privacy Hinder the IoT Revolution?
  5. Securing the IoT: Proactive Strategies to Beat Emerging Threats
  6. Future-Proofing IoT Security: Expert Strategies for a Safer Connected World
  7. Securing the 20th Anniversary of the Internet of Things: Protecting Our Hyperconnected Future
  8. IoT and AI: Transforming Everyday Life and Industry
  9. Six Proven Steps to Secure Your Industrial IoT Platform
  10. Is Security the Biggest Threat to Industrial IoT?