22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
好的,我现在需要帮用户总结一篇关于网络安全隐患的文章,控制在100字以内。首先,我得通读整篇文章,抓住主要内容。 文章主要讲的是研究人员发现了Lantronix和Silex的串口转IP转换器中的22个新漏洞,这些漏洞可能被用来劫持设备和篡改数据。Forescout Research的Vedere Labs给这些漏洞起了个代号BRIDGE:BREAK,并且发现全球有近2万个这样的转换器暴露在网上。 漏洞包括远程代码执行、拒绝服务、认证绕过等,成功利用这些漏洞可能导致设备被控制、数据被篡改,甚至影响关键任务设备。厂商已经发布了安全更新,并建议用户更换默认密码、避免弱密码、分割网络等措施。 总结的时候,我需要涵盖主要发现:22个漏洞、影响范围、漏洞类型以及厂商的应对措施。同时要简洁明了,不超过100字。 可能会这样组织语言:研究人员发现Lantronix和Silex的串口转IP转换器存在22个新漏洞,可能被用来劫持设备和篡改数据。这些漏洞包括远程代码执行和认证绕过等类型。厂商已发布安全更新,并建议用户采取措施加强防护。 检查一下字数是否在限制内,并确保没有使用“文章内容总结”之类的开头。 </think> 研究人员发现Lantronix和Silex的串口转IP转换器存在22个新漏洞,可能被用来劫持设备和篡改数据。这些漏洞包括远程代码执行和认证绕过等类型。厂商已发布安全更新,并建议用户采取措施加强防护。 2026-4-21 15:46:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Network Security / Vulnerability

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them.

The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed online globally.

"Some of these vulnerabilities allow attackers to take full control of mission-critical devices connected via serial links," the cybersecurity company said in a report shared with The Hacker News.

Serial-to-IP converters are hardware devices that enable users to remotely access, control, and manage any serial device over an IP network or the internet by "bridging" legacy applications and industrial control systems (ICS) that operate over TCP/IP.

At a high level, as many as eight security flaws have been discovered in Lantronix products (EDS3000PS Series and EDS5000 Series) and 14 in Silex SD330-AC. These shortcomings fall under the following broad categories -

  • Remote code execution - CVE-2026-32955, CVE-2026-32956, CVE-2026-32961, CVE-2025-67041, CVE-2025-67034, CVE-2025-67035, CVE-2025-67036, CVE-2025-67037, and CVE-2025-67038
  • Client-side code execution - CVE-2026-32963
  • Denial-of-service (DoS) - CVE-2026-32961, CVE-2015-5621, CVE-2024-24487
  • Authentication bypass - CVE-2026-32960, CVE-2025-67039
  • Device takeover - FSCT-2025-0021 (no CVE assigned), CVE-2026-32965, CVE-2025-70082
  • Firmware tampering - CVE-2026-32958
  • Configuration tampering - CVE-2026-32962, CVE-2026-32964
  • Information disclosure - CVE-2026-32959
  • Arbitrary file upload - CVE-2026-32957

Successful exploitation of the aforementioned flaws could allow attackers to disrupt serial communications with field assets, conduct lateral movement, and tamper with sensor values or modify actuator behavior.

In a hypothetical attack scenario, a threat actor could gain initial access to a remote facility through an internet-exposed edge device, such as an industrial router or firewall, and then weaponize BRIDGE:BREAK vulnerabilities to compromise the serial-to-IP converter, and alter serial data moving to or from the IP network.

Lantronix and Silex have released security updates to address the identified issues -

Besides applying patches, users are advised to replace default credentials, avoid using weak passwords, segment networks to prevent bad actors from reaching vulnerable serial-to-IP converters or using them as jumping-off points to other critical assets, and ensure the devices are not exposed to the internet.

"This research highlights weaknesses in serial-to-IP converters and the risks they can introduce in critical environments," Forescout said. "As these devices are increasingly deployed to connect legacy serial equipment to IP networks, vendors and end-users should treat their security implications as a core operational requirement."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
如有侵权请联系:admin#unsafe.sh