Forescout Uncovers 22 Vulnerabilities in Serial-to-IP Converters, Exposing Critical Infrastructure Risk

  • Forescout researchers (Vedere Labs) identified 22 new vulnerabilities affecting serial-to-IP converters from Lantronix and Silex.
  • Thousands of these converters are currently exposed online, increasing attack surface.
  • The vulnerabilities could enable remote code execution, data tampering, and denial-of-service attacks.
  • The research highlights the ongoing importance of human expertise in identifying vulnerabilities, despite advances in AI like Claude Mythos.
  • Forescout will present findings and demonstrations at Black Hat Asia 2026 on April 23.

The BRIDGE:BREAK research highlights a significant and often overlooked security risk within critical infrastructure: the widespread use of vulnerable serial-to-IP converters. These devices, frequently deployed to bridge legacy systems, create a critical attack vector that can compromise operations, manipulate data, and enable lateral movement within networks. The findings underscore the ongoing need for robust asset discovery, network segmentation, and proactive vulnerability management, particularly as AI-driven threat discovery accelerates.

AI Impact
The accelerating pace of AI-driven vulnerability discovery will likely overwhelm traditional patching cycles, forcing organizations to prioritize remediation based on contextual risk rather than simply addressing every disclosed flaw.
Legacy Systems
The prevalence of serial-to-IP converters in critical infrastructure underscores the ongoing challenge of securing legacy systems, and the need for creative solutions beyond simple upgrades.
Visibility Gaps
The ease with which Forescout researchers identified exposed converters suggests a systemic lack of asset visibility within many organizations, which will likely draw increased regulatory scrutiny.