Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking
    Cybersecurity

    Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking

    adminBy adminApril 20, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Industrial vulnerabilities
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose operational technology (OT), healthcare, and other types of systems to remote attacks.

    Serial-to-IP converters, also known as serial device servers, are hardware devices that bridge legacy serial equipment to modern Ethernet/IP networks, allowing old industrial control systems (ICS) and other OT devices to communicate remotely.

    Researchers at network security and threat detection company Forescout Technologies have analyzed these devices and found numerous vulnerabilities that could be valuable to threat actors. 

    Serial-to-IP converters are used in sectors such as industrial, telecoms, retail, healthcare, energy and utilities, and transportation. The devices are made by several major companies, including Moxa, Digi, Advantech, Perle, Lantronix, and Silex.

    Some of these vendors have reported deploying millions of devices, and a Shodan search shows nearly 20,000 internet-exposed systems worldwide. 

    “Using open-source intelligence (OSINT), attackers can find details about some of these devices, including internal IP addresses, model and vendor names, and photographs from electrical substations, water treatment plants, and other critical infrastructure environments,” Forescout researchers explained. 

    Advertisement. Scroll to continue reading.

    In addition to internet-exposed devices, attackers could target serial-to-IP converters on local networks, which can be compromised via vulnerabilities or misconfigurations in edge devices such as routers and firewalls.

    Forescout’s research, which focused on Silex and Lantronix devices, led to the discovery of 20 new vulnerabilities across the two vendors’ products, including weaknesses that can be exploited without authentication. 

    The vulnerabilities, collectively tracked as BRIDGE:BREAK, can be exploited for OS command injection and remote code execution, firmware tampering, denial-of-service (DoS) attacks, and device takeovers.

    Some of the flaws can allow attackers to upload arbitrary files, bypass authentication, and obtain information. 

    Forescout researchers showed the potential impact of these vulnerabilities in real-world environments. They demonstrated how an attacker could exploit the flaws to tamper with data, for instance, manipulating sensor readings in industrial and healthcare environments to conceal dangerous conditions that would normally require human intervention.

    In another scenario, the researchers described how an extortion group or a state-sponsored threat actor could cause a DoS condition in a healthcare environment by delivering malicious firmware to devices.

    “Once activated, the weaponized firmware could cause serial-to-IP converters to stop responding on the network. Potential impacts include: analyzers stop reporting results to laboratory information systems, creating processing backlogs; surgical lighting controllers become unresponsive to remote commands; infusion pump calibration and certification workflows are halted; telemetry from environmental sensors is interrupted; Patient monitors lose network connectivity,” the researchers explained.

    Lantronix and Silex have both been notified and they have released patches. The cybersecurity agency CISA recently published an advisory describing the Lantronix vulnerabilities. Silex has published an advisory on its own website. 

    It’s important for organizations not to ignore the risks posed by the use of serial-to-IP converters, as these devices have been targeted in the wild. They were targeted by Russian hackers in the 2015 Ukraine energy attack and, more recently, in attacks targeting energy facilities in Poland.  

    Forescout will publish a report detailing the BRIDGE:BREAK vulnerabilities on Tuesday, April 21. 

    Related: Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking

    Related: 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

    Related: ZionSiphon Malware Targets ICS in Water Facilities

    Converter Expose Flaws hacking healthcare SerialtoIP Systems
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article31 Call to Action Examples + How to Write Your Own
    Next Article Google Play Store 50.9.24 APK Download by Google LLC
    admin
    • Website

    Related Posts

    The Gentlemen ransomware now uses SystemBC for bot-powered attacks

    April 20, 2026

    Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

    April 20, 2026

    Stellantis teams with Microsoft to strengthen digital capabilities

    April 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    6 small home upgrades that actually add value when you sell

    April 20, 2026

    The Gentlemen ransomware now uses SystemBC for bot-powered attacks

    April 20, 2026

    How To Build AI Visibility In 90 Days [Webinar]

    April 20, 2026

    Google Play Store 50.9.24 APK Download by Google LLC

    April 20, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,413)
    • Privacy & Online Earning (173)
    • SEO & Digital Marketing (858)
    • Tech Tools & Mobile / Apps (1,703)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    6 small home upgrades that actually add value when you sell

    April 20, 2026

    The Gentlemen ransomware now uses SystemBC for bot-powered attacks

    April 20, 2026

    How To Build AI Visibility In 90 Days [Webinar]

    April 20, 2026
    Most Popular
    • 6 small home upgrades that actually add value when you sell
    • The Gentlemen ransomware now uses SystemBC for bot-powered attacks
    • How To Build AI Visibility In 90 Days [Webinar]
    • Google Play Store 50.9.24 APK Download by Google LLC
    • Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking
    • 31 Call to Action Examples + How to Write Your Own
    • Motorola strives for ‘iconic’ again in the Razr 2026 series, teases foldables before launch
    • Google tests video ads in local search results
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.