LIVE NEWS
  • News Wrap: Patel sues The Atlantic over story alleging excessive drinking and absences
  • AACR in 30 Seconds: CAR-T promise, Merck’s new move, rural health
  • Motorola Moto G (2026) review: Why I’d pick this $200 phone over competing models
  • ‘Predators’: Amnesty slams Netanyahu, Putin, Trump as human rights decline | Human Rights News
  • OpenAI Scales Trusted Access for Cyber Defense With GPT-5.4-Cyber: a Fine-Tuned Model Built for Verified Security Defenders
  • A new force of nature is reshaping the planet, study finds
  • Unicoin Foundation Debuts, Aligning Social Impact with the Future of Responsible Crypto By Chainwire
  • Canadian Tourist Is Shot Dead in Shooting at Mexico’s Pyramids
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking
Cybersecurity

Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking

primereportsBy primereportsApril 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking
Share
Facebook Twitter LinkedIn Pinterest Email


Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose operational technology (OT), healthcare, and other types of systems to remote attacks.

Serial-to-IP converters, also known as serial device servers, are hardware devices that bridge legacy serial equipment to modern Ethernet/IP networks, allowing old industrial control systems (ICS) and other OT devices to communicate remotely.

Researchers at network security and threat detection company Forescout Technologies have analyzed these devices and found numerous vulnerabilities that could be valuable to threat actors. 

Serial-to-IP converters are used in sectors such as industrial, telecoms, retail, healthcare, energy and utilities, and transportation. The devices are made by several major companies, including Moxa, Digi, Advantech, Perle, Lantronix, and Silex.

Some of these vendors have reported deploying millions of devices, and a Shodan search shows nearly 20,000 internet-exposed systems worldwide. 

“Using open-source intelligence (OSINT), attackers can find details about some of these devices, including internal IP addresses, model and vendor names, and photographs from electrical substations, water treatment plants, and other critical infrastructure environments,” Forescout researchers explained. 

Advertisement. Scroll to continue reading.

In addition to internet-exposed devices, attackers could target serial-to-IP converters on local networks, which can be compromised via vulnerabilities or misconfigurations in edge devices such as routers and firewalls.

Forescout’s research, which focused on Silex and Lantronix devices, led to the discovery of 20 new vulnerabilities across the two vendors’ products, including weaknesses that can be exploited without authentication. 

The vulnerabilities, collectively tracked as BRIDGE:BREAK, can be exploited for OS command injection and remote code execution, firmware tampering, denial-of-service (DoS) attacks, and device takeovers.

Some of the flaws can allow attackers to upload arbitrary files, bypass authentication, and obtain information. 

Forescout researchers showed the potential impact of these vulnerabilities in real-world environments. They demonstrated how an attacker could exploit the flaws to tamper with data, for instance, manipulating sensor readings in industrial and healthcare environments to conceal dangerous conditions that would normally require human intervention.

In another scenario, the researchers described how an extortion group or a state-sponsored threat actor could cause a DoS condition in a healthcare environment by delivering malicious firmware to devices.

“Once activated, the weaponized firmware could cause serial-to-IP converters to stop responding on the network. Potential impacts include: analyzers stop reporting results to laboratory information systems, creating processing backlogs; surgical lighting controllers become unresponsive to remote commands; infusion pump calibration and certification workflows are halted; telemetry from environmental sensors is interrupted; Patient monitors lose network connectivity,” the researchers explained.

Lantronix and Silex have both been notified and they have released patches. The cybersecurity agency CISA recently published an advisory describing the Lantronix vulnerabilities. Silex has published an advisory on its own website. 

It’s important for organizations not to ignore the risks posed by the use of serial-to-IP converters, as these devices have been targeted in the wild. They were targeted by Russian hackers in the 2015 Ukraine energy attack and, more recently, in attacks targeting energy facilities in Poland.  

Forescout will publish a report detailing the BRIDGE:BREAK vulnerabilities on Tuesday, April 21. 

Related: Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking

Related: 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

Related: ZionSiphon Malware Targets ICS in Water Facilities

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCEO of Minnesota-based company shares her experience applying for a tariff refund : NPR
Next Article Polymarket Eyes $400M Raise at $15B Valuation Amid Surging Prediction Market Demand: Report
primereports
  • Website

Related Posts

Cybersecurity

Why the Axios attack proves AI is mandatory for supply chain security

April 20, 2026
Cybersecurity

NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience

April 20, 2026
Cybersecurity

I stopped using my iPhone’s hotspot after testing this 5G router – and that won’t change

April 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • News Wrap: Patel sues The Atlantic over story alleging excessive drinking and absences
  • AACR in 30 Seconds: CAR-T promise, Merck’s new move, rural health
  • Motorola Moto G (2026) review: Why I’d pick this $200 phone over competing models
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.