Skip to content
  • Case Studies
  • Cybersecurity Readiness Assessment
simply data logo
  • About
    • About Us
    • Innovation
      • SD Platform Overview
    • Certifications & Awards
  • Our Services
    • CyberSecurity Services
      • DFIR (Digital Forensics and Incident Response)
      • Compromise Assessment
      • Security Operations Center (SOC) Managed Service
        • SD-Cyber Deception
        • Threat Intelligence
        • Managed Detection and Response (MDR)
        • Cloud Security Posture Management (CSPM)
        • Web Defacement Monitoring
        • In-house Automation Script Development
        • Advanced Malware Analysis & Threat Intelligence
        • Office 365 Monitoring
        • SaaS Monitoring
      • Extended Threat Intelligence
        • Dark Web Monitoring
        • Attack Surface Management
        • Cyber Risk Management
      • Security Posture Assessment (SPA)
      • VAPT & Penetration Testing
      • Network & Security Configuration Audit & Hardening
      • Phishing Email Simulation
    • Managed Network & Security Services
    • Application Performance Monitoring (APM)
      • APM as a Service (APMaaS)
      • Cloud Monitoring
      • Database Performance Monitoring
      • Web Application Monitoring
      • Synthetic Testing Monitoring
      • Real User Monitoring (RUM)
      • Application Stress Test / Load Test Services
    • Consultancy Services
      • NCSB Risk Assessment
      • Security BluePrint™ Consultancy Services
    • Application Framework
      • Safety Net Core System Framework
    CyberSecurity Services
    • VAPT & Penetration Testing
    • Cyber - 911 - DFIR Services
    • Compromise Assessment
    • Security Operations Center (SOC)
    • Extended Threat Intelligence
    • Security Posture Assessment (SPA) Services
    • Network & Security Configuration Audit & Hardening
    • Phishing Email Simulation
    Managed Network & Security Services
    • Managed Network & Security Services
    Consultancy Services
    • NCSB Risk Assessment
    • Security BluePrint™ Consultancy Services
    Application Framework 
    • Safety Net Core System Framework
    Application Performance Monitoring
    • APM as a Service (APMaaS)
    • Cloud Monitoring
    • Database Performance Monitoring
    • Web Application Monitoring
    • Synthetic Testing Monitoring
    • Real User Monitoring (RUM)
    • Stress Test / Load Test – Performance Assessment

    Not Sure What Security Threats Your Organization is Facing?

    We can help. Contact us now for a free consultation and protect your business from potential risks.

    Contact Us
  • Technology Vendor Partners
  • Blog & News
  • Contact
    • Contact Us
    • Become a Simply Data Partner

Under Attack?

Submit your message through our contact form or call us at +603 5886 2714.

    Cybersecurity Tips

    IoT Penetration Testing: Real Findings from 7 Enterprise IoT Devices

    April 2, 2026
    IoT penetration testing Malaysia blog thumbnail

    Home – IoT Penetration Testing: Real Findings from 7 Enterprise IoT Devices

    Smart building infrastructure is now standard across enterprise Malaysia — IP cameras, video intercoms, facial recognition terminals, and NVRs are deployed at scale. IoT penetration testing Malaysia reveals these devices are rarely as secure as assumed — most organisations trust them by default. They’re “just cameras.” They’re “just speakers.”

    That assumption is exactly what attackers rely on.

    This article draws from a real IoT penetration testing engagement our team conducted in Malaysia, where we physically disassembled and security-tested seven enterprise IoT devices. We’ll show you what we tested, how we tested it, what we found — including a live firmware extraction — and why Chinese-branded IoT devices deserve a closer look before deployment.

    Disclosure note: All findings are presented in anonymised and generalised form for educational purposes. No client-identifying information is disclosed. Device brand references relate to security research observations, not to any specific client’s environment.

    What Is IoT Penetration Testing (IoT VAPT)?

    IoT Vulnerability Assessment and Penetration Testing (VAPT) is a hands-on security assessment of connected devices — covering hardware interfaces, embedded firmware, communication protocols, and supporting services.

    Unlike a web application pentest (which you can run remotely), IoT security testing requires physical access to the device. Our testers probe actual circuit boards, read firmware from memory chips, intercept serial communications, and test hardware-level weaknesses that network-only scanning would never discover.

    The core question we answer: if an attacker had physical access to your IoT device — a disgruntled employee, a third-party contractor, or someone with 15 minutes alone in a server room — what could they do?

    The Scope: 7 Enterprise IoT Devices Tested

    The following device types, commonly found in smart building and physical security environments, were assessed:

    🎙️Master Intercom
    🔊IP Speaker
    📷CCTV Camera
    👤Facial Recognition
    🔀Network Switch
    🖥️Display Controller
    💾NVR (Network Video Recorder)

    Each device was physically inspected, disassembled where possible, and subjected to hardware-level security testing using both manual techniques and specialist tools.

    Our IoT Penetration Testing Methodology

    We follow a structured five-phase approach:

    IoT penetration testing methodology cycle: Planning, Information Gathering, Vulnerability Scanning, Penetration Testing, Reporting
    Our IoT penetration testing methodology: Planning → Information Gathering → Vulnerability Scanning → Penetration Testing → Reporting.

    In the Planning phase we define scope, objectives, and the attack surface for each device. Information Gathering covers physical inspection — identifying UART, SPI, I2C, JTAG headers, memory chips, and chip markings. Vulnerability Scanning systematically maps weaknesses. Penetration Testing involves controlled exploitation with proof-of-concept evidence. Reporting documents findings using CVSS scoring with actionable remediation guidance.

    Tools We Use for IoT Hardware Security Testing

    ToolWhat It Does
    MultimeterDetect GND by continuity, measure voltage, identify UART TX/RX pins on PCB
    CH341A USB ProgrammerRead, erase, and write 24-series EEPROM and 25-series SPI flash chips
    UART ConnectorBridge TTL serial from microcontrollers to a USB COM port — enables console access
    FlashromOpen-source tool to dump, erase, or write firmware binaries from flash chips
    SOIC8 ClipClips directly onto the flash chip pins without desoldering — zero-invasive firmware extraction

    Vulnerability Summary: What We Found

    Across all seven devices, we identified one medium-severity vulnerability affecting a display controller. The remaining six devices demonstrated strong built-in security controls.

    Vulnerability Findings by Severity — 7 Devices Tested

    0

    Critical

    0

    High

    1

    Medium

    0

    Low

    Critical
    High
    Medium
    Low

    0 Critical
    0 High
    1 Medium
    0 Low

    1 medium-severity finding identified across 7 enterprise IoT devices — no critical or high-risk vulnerabilities.

    Key Finding — Insecure Flash Memory Storage

    ⚠ Medium Severity · CVSS 5.6

    Insecure Flash Memory Storage on IoT Device

    Affected component: Display Controller — Physical SPI Interface
    Impact: Sensitive data including hardcoded credentials, cryptographic keys, configuration files, and proprietary firmware may be extracted by anyone with brief physical access to the device.

    How It Works — The Attack

    The display controller’s SPI flash memory chip sat exposed on the PCB with no physical protection, no read-lock, and no access authentication. Using a SOIC8 clip (a small clamp that grips directly onto the chip’s pins without any soldering) connected to a CH341A USB programmer, our tester attached the clip to the chip in under 60 seconds:

    IoT VAPT risk justification table: Physical attack vector, Medium overall severity for flash memory extraction finding
    Real-world proof-of-concept: SOIC8 clip clamped onto the exposed SPI flash memory chip. This is all the hardware needed to dump the entire device firmware.

    With the clip in place, a single flashrom command was run on Kali Linux:

    flashrom -p ch341a_spi -r firmware.bin
    Flashrom command output on Kali Linux showing successful SPI flash memory dump — firmware extracted with no authentication required
    The flashrom tool identified the GigaDevice SPI flash chip (8MB) and successfully read the entire firmware contents. No authentication, no encryption, no protection blocked the operation.

    The entire 8MB of flash memory was dumped in seconds. The tool confirmed: no authentication or protection blocked the read.

    What an Attacker Can Do With the Dump

    • Recover credentials in plaintext — usernames, passwords, API keys stored without encryption
    • Perform offline reverse engineering — analyse proprietary logic, cryptographic implementations, hardcoded secrets
    • Reflash a backdoored firmware — write modified firmware back to the chip to establish persistent, undetected access
    • Use extracted config to pivot — network credentials or authentication tokens found in the dump can be used to access other connected systems
    OWASP IoT Top 10 Reference: This finding maps to I4 — Lack of Secure Update Mechanism and I8 — Lack of Physical Hardening from the OWASP IoT Top 10 (2023).

    Remediation Recommendations

    Control AreaAction Required
    Physical SecurityTamper-resistant casing, sealed enclosures, tamper-evident labels. Restrict physical access to authorised personnel only.
    Flash Memory ProtectionEnable read protection / flash lock (if chipset supports). Disable debug interfaces (JTAG, UART, SPI) in production firmware.
    Data ProtectionEncrypt all sensitive data in flash using AES-256. Never store plaintext credentials. Use TPM or secure element for keys where available.
    Firmware IntegrityImplement firmware signing and verification. Enable secure boot. Detect and prevent unauthorised reflashing.
    MonitoringLog all firmware update events. Alert on abnormal hardware maintenance activity. Monitor for unauthorised programmer device connections.

    The Chinese-Brand CCTV Question: Should You Be Concerned?

    ⚠ Why Chinese IoT Brands Are Under Global Scrutiny

    Several of the most widely deployed CCTV and IoT brands in Malaysia — including Hikvision and Dahua — are Chinese state-linked companies. Their devices are embedded in offices, hospitals, government buildings, data centres, and critical infrastructure across the country. Internationally, governments have taken increasingly firm positions on these brands.

    What Global Regulators Have Said

    • United States (FCC, 2022): Banned Hikvision and Dahua from receiving new equipment authorisations. Classified as “unacceptable national security risks.”
    • United Kingdom (Cabinet Office, 2022): Ordered removal of Chinese-made surveillance cameras from government “sensitive sites.” Parliament passed a ban on new installations.
    • Australia (2022): Ordered removal of Hikvision and Dahua cameras from Defence buildings.
    • Lithuania, India, Taiwan: Various restrictions or guidance advisories on Chinese-brand surveillance hardware in sensitive environments.

    The Core Security Concerns

    • Backdoor risk: Historical CVEs have documented undocumented backdoor accounts (e.g., CVE-2021-36260 — Hikvision remote command execution via web server, CVSS 9.8 Critical). These are not theoretical — they were exploited in the wild.
    • Forced cloud connectivity: Many devices are preconfigured to call home to Chinese cloud infrastructure, creating persistent data exfiltration channels even when used on isolated networks.
    • Firmware supply chain risk: Devices may ship with firmware developed under Chinese government oversight, with no independent third-party security audit.
    • Weak default credentials: A significant proportion of deployed Hikvision/Dahua devices in Malaysia still use factory default passwords — trivially exploitable remotely.
    • Limited transparency: Independent security researchers face barriers to responsible disclosure, and firmware source code is proprietary.

    What Our Testing Found

    During this engagement, the enterprise-grade CCTV cameras tested demonstrated strong hardware security controls at the device level — including a secure boot chain, encrypted firmware updates, anti-rollback protection, and no exposed JTAG/UART debug interfaces. Physical testing confirmed the camera casing was vandal-resistant (IK10 rated), successfully resisting all physical access attempts:

    IoT device being physically disassembled and inspected during hardware security assessment
    Physical security testing of an enterprise IP camera: the vandal-resistant (IK10) casing withstood all physical access attempts. Internal components remained inaccessible — hardware-level security was validated.

    This is an important distinction: hardware-level firmware security can be strong while network-level and cloud-connectivity risks remain. A device can pass physical hardening tests and still phone home to external servers, use default credentials over the network, or be vulnerable to remote firmware exploits (like the CVE-2021-36260 RCE mentioned above).

    Our Recommendation for Malaysian Organisations

    • Segment IoT devices onto a separate VLAN with strict firewall rules. Block outbound connections to Chinese cloud endpoints unless explicitly required.
    • Change all default credentials immediately upon deployment — this alone eliminates the majority of opportunistic attacks.
    • Disable P2P/cloud features if remote access is not required. These features create unnecessary attack surface and data exposure.
    • Conduct IoT VAPT before deployment — both physical hardware testing and network-level assessment. Do not assume vendor security claims are accurate.
    • For sensitive environments (government, financial services, healthcare, critical infrastructure): consider procurement policies that explicitly exclude devices from vendors with national security risk designations in allied countries.
    • Reference NACSA guidelines for IoT devices deployed in critical national information infrastructure (CNII) environments.

    Devices That Passed: What Good IoT Security Looks Like

    Six of the seven devices tested showed no exploitable vulnerabilities. The security controls validated during physical testing included:

    ✅ Security Controls Confirmed in the Field

    • Secure boot chain — prevents unauthorised firmware from executing at startup
    • Encrypted firmware update packages — update files are cryptographically signed and verified
    • Anti-rollback (anti-degradation) protection — blocks downgrade to older vulnerable firmware versions
    • No exposed JTAG/UART debug interfaces — debug access eliminated in production hardware
    • Restricted access to firmware and memory components — physical hardening resists chip-level attacks
    • Hardened PCB architecture — board layout designed to resist tampering
    IP speaker PCB internals — probed for UART, SPI, and JTAG interfaces; most pins tested as GND with no accessible debug interfaces
    IP Speaker PCB: our team probed for UART, SPI, and JTAG interfaces using a digital multimeter. Most pins tested as GND — debug interfaces are effectively concealed. No console access achievable.
    NVR internal PCB showing hardened design — no accessible debug interfaces identified during IoT penetration testing
    NVR internal PCB: no accessible debug interfaces identified. Firmware extraction was not feasible under normal conditions — hardware hardening confirmed.

    How IoT VAPT Maps to PDPA Compliance in Malaysia

    Under Malaysia’s Personal Data Protection Act (PDPA), organisations processing personal data — including CCTV footage, facial recognition biometrics, and access logs — must take reasonable security steps to protect that data from unauthorised access or disclosure.

    An IoT device with unprotected flash memory (like the finding in this report) is a direct PDPA risk: if an attacker extracts credentials from the device and accesses the surveillance system, the CCTV footage of employees, visitors, and customers becomes a PDPA data breach.

    FrameworkReferenceHow This Applies
    OWASP IoT Top 10I4 — Insecure Update MechanismFirmware extractable without authentication verification
    OWASP IoT Top 10I8 — Lack of Physical HardeningFlash chip accessible, no tamper protection
    Malaysia PDPASecurity Principle (s.9)Reasonable steps required to protect PII from unauthorised access
    NACSA Cybersecurity Act 2024Physical Security ControlsIoT in critical environments must have physical access controls
    BNM RMiTTechnology Risk ManagementAll connected devices in financial institutions require security assessment before deployment

    Frequently Asked Questions About IoT VAPT

    What is IoT penetration testing and why is it different from a regular pentest?
    A standard network pentest focuses on network-accessible services and protocols. IoT VAPT goes further — we physically open the device, probe the circuit board for debug interfaces (UART, JTAG, SPI), extract firmware from memory chips, and test hardware-level protections that network scanning never reaches. It’s the difference between testing the door lock and checking if someone can go through the wall.
    What types of IoT devices can be penetration tested?
    Any connected device: IP cameras (CCTV), NVRs, smart intercoms, facial recognition terminals, access control systems, IP speakers, industrial PLCs, smart meters, building management systems, medical devices, and routers. If it has firmware and a circuit board, it can be tested.
    Do I need to physically send my devices to you?
    For hardware-level testing (firmware extraction, interface probing) — yes, physical access is required. We can also conduct network-level IoT testing remotely. A full IoT VAPT covers both vectors. For large deployments, we can conduct on-site testing at your premises.
    Are Chinese-brand CCTV cameras safe to use in Malaysia?
    The answer depends heavily on the deployment context. For general commercial environments, Chinese-brand cameras can be acceptable if properly configured — network-segmented, default credentials changed, P2P/cloud features disabled, and firmware kept updated. For sensitive environments (government, financial services, data centres, critical infrastructure), a full IoT VAPT and a risk-based procurement policy are strongly recommended. The hardware security controls of enterprise-grade models can be solid; the network and cloud connectivity risks require active management.
    How long does an IoT VAPT take?
    A targeted engagement covering 5–10 devices typically takes 5–10 business days including physical testing, firmware analysis, and report preparation. Larger engagements covering industrial environments or mixed IoT ecosystems may take 2–4 weeks. We provide a detailed scope-of-work before engagement.
    Is IoT VAPT required for PDPA compliance?
    PDPA does not mandate a specific testing methodology, but it requires “reasonable security steps” to protect personal data. IoT devices that capture biometrics, CCTV footage, or access logs are firmly within PDPA scope. An IoT VAPT provides documented evidence of due diligence — and identifies vulnerabilities before a regulator or attacker does.




    Is Your IoT Infrastructure Really Secure?

    Our team provides hands-on IoT penetration testing across Malaysia — from smart building devices to industrial controllers. We test what others can’t: the hardware itself. CREST-accredited, NACSA-licensed, Malaysia-based.

    Get a Free IoT Security Consultation →

    No commitment required · Response within 1 business day

    • China CCTV
    • Hardware Security
    • Hikvision
    • IoT Security
    • IoT VAPT
    • Malaysia
    • PDPA
    • penetration-testing
    • vapt

    Post navigation

    Previous
    Next

    Search

    Categories

    • Announcements (8)
    • Cybersecurity Tips (39)
    • Industry Insights & Trends (3)
    • Latest News (2)
    • Service Spotlight (1)

    Recent posts

    • featured what is vapt malaysia 2026 1024x683
      What is VAPT? Penetration Testing Malaysia: Complete Beginner’s Guide 2026
    • IoT penetration testing Malaysia blog thumbnail
      IoT Penetration Testing: Real Findings from 7 Enterprise IoT Devices
    • Why Your Business Needs Real Time Security Intelligence to Stay Ahead of Cyber Threats
      Why Your Business Needs Real-Time Security Intelligence to Stay Ahead of Cyber Threats

    Tags

    2026 Trends AI Threats apm Certification China CCTV cloud-security Company News Compliance Cost-Benefit Analysis Credential Compromise cyber-security-act cybersecurity-malaysia Cybersecurity News Cybersecurity Spending Cyber Threats Dark Web DFIR Hardware Security Hikvision Incident Response IoT Security IoT VAPT iso27001 Malaysia Malaysia Cybersecurity 2025 Managed Services MITRE ATT&CK nacsa Network Security PDPA penetration-testing Ransomware ROI SIEM SME Budget SME Security soc threat-intelligence Threat Report vapt Web Application Security

    Related posts

    blog image 2 vapt fixed
    Cybersecurity Tips

    Penetration Testing Malaysia: What Is VAPT, Why Your Business Needs It, and What to Look For in a Provider

    March 1, 2026

    Penetration testing in Malaysia is now a regulatory requirement for financial institutions and a best practice for all businesses. Learn what VAPT covers, what NACSA and BNM RMiT require, and how to choose a CREST-certified provider.

    blog image 1 pdpa fixed
    Cybersecurity Tips

    PDPA Malaysia 2024 Amendment: What Every Malaysian Business Must Do Before You Get Fined

    March 1, 2026

    Malaysia’s PDPA Amendment Act 2024 introduces mandatory 72-hour breach notifications, fines up to RM1 million, and expanded data subject rights. Here’s what your business must do to stay compliant in 2025 and beyond.

    Malaysia Cybersecurity Threat Report 2025
    Latest News

    Malaysia Cybersecurity Threat Report 2025: Key Findings & Strategic Insights

    February 27, 2026

    Simply Data’s 2025 Malaysia Cybersecurity Threat Report analyses 120B+ security logs, 3,945 escalated incidents, and 33M+ malicious IOCs. Discover the top threats targeting Malaysian organisations and what to do now.

    simply data logo

    Started in 2022, Simply Data is a CREST certified and NACSA Licensed Cyber Security company in Malaysia that provides cyber security services including Network & Security IT Managed Service, Security Operation Centre (SOC), Cyber Threat Intelligence, Vulnerability Assessment & Penetration Testing (VAPT) service, Application Performance Monitoring (APM) services, and more.n

    • B-03A-03, 3RD Floor, Block B Setiawalk, Persiaran Wawasan, Pusat Bandar Puchong, 47100 Puchong, Selangor
    • +603 5886 2714
    • contactus@simplydata.com.my
    Quick Links
    • Home
    • About Us
    • Innovation
    • Technology Vendor Partners
    • Blog / News
    • Career Opportunities
      Hiring
    • Become a Simply Data Partner
    • Cybersecurity Readiness Assessment
    • Malaysia CyberSecurity Act 854
    Application Framework 
    • Safety Net Core System Framework
    CyberSecurity Services
    • VAPT & Penetration Testing
    • Cyber - 911 - DFIR Services
    • Compromise Assessment
    • Security Operations Center (SOC)
    • Extended Threat Intelligence
    • Security Posture Assessment (SPA) Services
    • Network & Security Configuration Audit & Hardening
    • Phishing Email Simulation
    Managed Network & Security Services
    • Managed Network & Security Services
    Observability ApplicationnPerformance Monitoring
    • Observability APM as a Service
    • Cloud Monitoring
    • Database Performance Monitoring
    • Web Application Monitoring
    • Synthetic Testing Monitoring
    • Real User Monitoring
    • Stress Test / Load Test – Performance Assessment
    Consultancy Services
    • NCSB Risk Assessment
    • Security BluePrint™ Consultancy Services

    © 2025 Simply Data Sdn Bhd. All rights reserved.

    • Terms & Conditions
    • Data Protection & User Privacy
    • Privacy Policy
    • Cookie Policy