Back to Resources
Field Note February 2026 6 min read

Your Camera System Is an IoT Network. Treat It That Way.

Surveillance NVRs and PTZ cameras have a long history of embedded vulnerabilities. In a facility with hundreds of devices, that's a substantial unmanaged footprint.

C

Cascadia OT Security

Physical Security

M. HOLBROOKEMP · 00294OT · TIER 2READER · DOOR 14BPHYSICAL ACCESSTIER 2 CRED

A mid-size manufacturer typically has 80 to 200 surveillance cameras. A large data center has 400 or more. Every one of those cameras is a Linux-based embedded device with a network stack, a web interface, and — unsurprisingly — a long list of published CVEs. And yet camera systems are almost universally deployed and then forgotten.

This is not a rant about a specific camera vendor. All the major vendors have shipped vulnerable firmware at various times. The issue is structural: camera systems are procured and installed by integrators, then operated by facilities teams, and almost never reviewed by security teams. The result is a few hundred unmanaged Linux boxes sitting on your network.

What the typical camera deployment actually looks like

This is not an exaggeration. This is what we find at a solid majority of facilities. And the attack paths that result are, by now, well-documented in the CISA alerts catalog.

The real risk

Two risks matter, in order:

What good camera operation looks like

Four things, none complicated:

The org chart question

The reason camera systems end up this way is almost always organizational. Facilities owns the cameras. IT owns the network. Security owns the policy. Nobody owns "the camera system as a cybersecurity asset." Fix the ownership question and the rest follows.

Our physical security consulting engagements always include the camera infrastructure as a first-class asset. If yours hasn't been reviewed in the last two years, it's time.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call