- Cybersecurity firm Forescout Research Vedere Labs has identified 22 new security flaws, codenamed BRIDGE:BREAK, in Lantronix and Silex serial-to-IP converters.
- The vulnerabilities, including critical Remote Code Execution and Authentication Bypass flaws, allow attackers to hijack devices and tamper with industrial control system data.
- Approximately 20,000 of these crucial bridging devices are exposed online globally, posing a significant threat to remote industrial operations.
Cybersecurity researchers disclosed 22 critical vulnerabilities in April 2026, codenamed BRIDGE:BREAK, within serial-to-IP converters that are widely used to connect legacy industrial hardware to modern networks. These flaws were found in popular models from manufacturers Lantronix and Silex, exposing critical infrastructure to remote hijacking.
According to a report shared with The Hacker News, researchers said, “Some of these vulnerabilities allow attackers to take full control of mission-critical devices connected via serial links.” Consequently, these “bridge” devices can become a dangerous entry point for threat actors targeting industrial control systems.
The research detailed nearly 20,000 of these converters exposed globally online. Meanwhile, Forescout’s analysis categorized the vulnerabilities, listing critical remote code execution flaws like CVE-2026-32955 and serious authentication bypass issues such as CVE-2026-32960.
Consequently, attackers could disrupt communications, conduct lateral movement, or alter sensor and actuator data. However, both Lantronix and Silex have released security patches to address the issues.
Forescout warned, “This research highlights weaknesses in serial-to-IP converters and the risks they can introduce in critical environments.” Therefore, users are urged to apply patches, change default credentials, and segment networks to mitigate the threat.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
