HomeVulnerability22 BRIDGE:BREAK Flaws Expose Hundreds of Lantronix and Silex Serial-to-IP Converters

22 BRIDGE:BREAK Flaws Expose Hundreds of Lantronix and Silex Serial-to-IP Converters

Cybersecurity researchers have recognized 22 new vulnerabilities in standard fashions of serial-to-IP converters from Lantronix and Silex that could possibly be exploited to hijack prone gadgets and tamper with information exchanged by them.

The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Analysis Vedere Labs, which recognized practically 20,000 Serial-to-Ethernet converters uncovered on-line globally.

“A few of these vulnerabilities permit attackers to take full management of mission-critical gadgets related through serial hyperlinks,” the cybersecurity firm stated in a report shared with The Hacker Information.

Serial-to-IP converters are {hardware} gadgets that allow customers to remotely entry, management, and handle any serial system over an IP community or the web by “bridging” legacy functions and industrial management programs (ICS) that function over TCP/IP.

At a excessive degree, as many as eight security flaws have been found in Lantronix merchandise (EDS3000PS Sequence and EDS5000 Sequence) and 14 in Silex SD330-AC. These shortcomings fall below the next broad classes –

  • Distant code execution – CVE-2026-32955, CVE-2026-32956, CVE-2026-32961, CVE-2025-67041, CVE-2025-67034, CVE-2025-67035, CVE-2025-67036, CVE-2025-67037, and CVE-2025-67038
  • Consumer-side code execution – CVE-2026-32963
  • Denial-of-service (DoS) – CVE-2026-32961, CVE-2015-5621, CVE-2024-24487
  • Authentication bypass – CVE-2026-32960, CVE-2025-67039
  • Machine takeover – FSCT-2025-0021 (no CVE assigned), CVE-2026-32965, CVE-2025-70082
  • Firmware tampering – CVE-2026-32958
  • Configuration tampering – CVE-2026-32962, CVE-2026-32964
  • Data disclosure – CVE-2026-32959
  • Arbitrary file add – CVE-2026-32957

Profitable exploitation of the aforementioned flaws may permit attackers to disrupt serial communications with area belongings, conduct lateral motion, and tamper with sensor values or modify actuator habits.

See also  Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

In a hypothetical assault situation, a menace actor may acquire preliminary entry to a distant facility by means of an internet-exposed edge system, similar to an industrial router or firewall, after which weaponize BRIDGE:BREAK vulnerabilities to compromise the serial-to-IP converter, and alter serial information transferring to or from the IP community.

Lantronix and Silex have launched security updates to handle the recognized points –

Moreover making use of patches, customers are suggested to switch default credentials, keep away from utilizing weak passwords, section networks to stop dangerous actors from reaching weak serial-to-IP converters or utilizing them as jumping-off factors to different vital belongings, and make sure the gadgets are usually not uncovered to the web.

“This analysis highlights weaknesses in serial-to-IP converters and the dangers they will introduce in vital environments,” Forescout stated. “As these gadgets are more and more deployed to attach legacy serial tools to IP networks, distributors and end-users ought to deal with their security implications as a core operational requirement.”

See also  Progress Software program Patches Important Pre-Auth Flaws in WS_FTP Server Product 
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular