Forescout researchers discovered 20 new vulnerabilities in Lantronix and Silex products and described theoretical attack scenarios.

Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose operational technology (OT), healthcare, and other types of systems to remote attacks.

Forescout Technologies has uncovered a series of critical vulnerabilities in serial-to-IP converters – widely used devices that connect legacy industrial systems to modern networks – raising significant concerns about cybersecurity risks across critical infrastructure sectors. The findings highlight how these often-overlooked devices are becoming prime targets for threat actors seeking to exploit weaknesses in operational technology (OT) environments.

Serial-to-IP converters play a crucial role in enabling communication between older serial-based equipment and Ethernet/IP networks, making them essential in industries such as healthcare, energy, manufacturing, telecommunications, and transportation. Major vendors in this space include Moxa, Digi, Advantech, Perle, Lantronix, and Silex, with millions of devices reportedly deployed worldwide. Security scans indicate that thousands of these systems remain exposed to the internet, increasing their susceptibility to attacks.

The vulnerabilities, collectively tracked as BRIDGE:BREAK, affect devices from Lantronix and Silex and include critical security flaws that can be exploited without authentication. These weaknesses enable attackers to execute remote code, inject malicious commands, tamper with firmware, and launch denial-of-service (DoS) attacks. In some cases, threat actors can bypass authentication mechanisms, upload arbitrary files, and take full control of affected devices.

Such capabilities present serious risks for organizations relying on interconnected industrial systems. Attackers exploiting these vulnerabilities could manipulate data flowing through compromised devices, potentially altering sensor readings in environments like healthcare or industrial facilities. This could allow dangerous conditions to go undetected, increasing the likelihood of operational failures or safety incidents.

The potential impact is particularly severe in healthcare settings, where compromised devices could disrupt critical operations. Malicious firmware, for example, could render systems unresponsive, leading to failures in laboratory reporting, interruptions in patient monitoring, and delays in essential medical workflows. These disruptions could not only affect operational efficiency but also pose direct risks to patient safety.

Beyond healthcare, the vulnerabilities expose broader risks across energy and utility infrastructures, where similar devices are used to monitor and control essential services. The interconnected nature of modern OT environments means that a single compromised device can create cascading effects across entire networks.

Both Lantronix and Silex have responded to the disclosure by releasing patches and security advisories to address the identified issues. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued an advisory outlining the risks associated with the Lantronix vulnerabilities, urging organizations to take immediate action.

The risks associated with serial-to-IP converters are not purely theoretical. These devices have previously been targeted in real-world cyberattacks, including incidents linked to the 2015 Ukraine energy grid attack and more recent operations against energy facilities in Poland. These cases underscore the growing interest of advanced threat actors in exploiting OT infrastructure as part of broader cyber campaigns.

As organizations continue to modernize legacy systems and expand connectivity across industrial environments, the need to secure foundational components like serial-to-IP converters is becoming increasingly urgent. The Forescout findings serve as a stark reminder that even small, embedded devices can represent significant entry points for cyberattacks if left unprotected.

Recommended Cyber Technology News :

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com  



🔒 Login or Register to continue reading