Connect with us
BRIDGE:BREAK vulnerabilities

Security

22 Flaws Expose Thousands of Serial-to-IP Converters

22 Flaws Expose Thousands of Serial-to-IP Converters

cybersecurity researchers have identified 22 new security vulnerabilities in widely used serial-to-IP converter devices from manufacturers Lantronix and Silex. The flaws, discovered by Forescout Research Vedere Labs, could allow attackers to hijack susceptible devices and tamper with the data they transmit. The research team found nearly 20,000 of these exposed converters online, underscoring the scale of the potential risk.

Scope and Impact of the BRIDGE:BREAK Vulnerabilities

The set of vulnerabilities has been collectively codenamed BRIDGE:BREAK. These converters are critical hardware components that bridge older serial-based equipment, like industrial machinery, medical devices, and point-of-sale systems, to modern IP networks. The exploitation of these flaws could lead to unauthorized access, data manipulation, or a complete device takeover.

Such an attack could have serious consequences, particularly in operational technology and industrial control system environments. Tampering with data from these devices could disrupt physical processes, lead to incorrect operational decisions, or facilitate further network intrusion.

Affected Devices and Manufacturer Response

The vulnerabilities affect specific popular models of serial-to-ethernet converters from Lantronix and Silex. Researchers have coordinated with both companies to disclose the findings responsibly. According to the advisory, patches and mitigation guidance are being made available by the vendors for the affected product lines.

Organizations using these devices are urged to consult the official security advisories from Lantronix and Silex. The advisories contain detailed lists of impacted models and specific firmware versions that require updating.

Security Recommendations for Organizations

Security experts recommend that network administrators take immediate action. The primary step is to identify any Lantronix or Silex serial converters on the network and apply the latest firmware patches provided by the manufacturers. If immediate patching is not possible, devices should be isolated from the public internet.

Furthermore, standard network security practices should be enforced. This includes placing these devices behind firewalls, using strong, unique passwords, and disabling any unnecessary network services on the converters. Regular vulnerability assessments of operational technology assets are also considered a best practice.

Looking Ahead: Patching and Mitigation

The disclosure of the BRIDGE:BREAK vulnerabilities highlights the ongoing security challenges in legacy and specialized connected hardware. As patches are rolled out, the focus will shift to the adoption rate among affected organizations. Security researchers and industry groups are expected to monitor for any attempted exploitation in the wild, while manufacturers continue to develop fixes for all identified flaws. The incident serves as a reminder for all sectors to maintain rigorous patch management cycles for all network-connected equipment.

Source: Forescout Vedere Labs

More in Security