← Back to BrewedIntel
vulnerabilitymediumBuilding Automation SecurityEmbedded System SecurityIoT Vulnerabilities

Dec 12, 2025 • ESET WeLiveSecurity

Black Hat Europe 2025: Was that device designed to be on the internet at all?

This Black Hat Europe 2025 talk addresses the security risks associated with internet-connected devices embedded within modern building infrastructure....

Source
ESET WeLiveSecurity
Category
vulnerability
Severity
medium

Executive Summary

This Black Hat Europe 2025 talk addresses the security risks associated with internet-connected devices embedded within modern building infrastructure. Researchers highlight that behind the facade of modern architecture, numerous outdated systems and devices contain unpatched vulnerabilities that were not designed with internet connectivity in mind. These building automation systems, including HVAC, lighting, and access control systems, represent an expanding attack surface. The presentation emphasizes the need for organizations to inventory connected devices, implement network segmentation, apply security patches, and reconsider which devices truly require internet connectivity to reduce exposure to potential exploitation.

Summary

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Published Analysis

This Black Hat Europe 2025 talk addresses the security risks associated with internet-connected devices embedded within modern building infrastructure. Researchers highlight that behind the facade of modern architecture, numerous outdated systems and devices contain unpatched vulnerabilities that were not designed with internet connectivity in mind. These building automation systems, including HVAC, lighting, and access control systems, represent an expanding attack surface. The presentation emphasizes the need for organizations to inventory connected devices, implement network segmentation, apply security patches, and reconsider which devices truly require internet connectivity to reduce exposure to potential exploitation. Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found