Researchers at Forescout's Vedere Labs have uncovered a set of 22 vulnerabilities, collectively named BRIDGE:BREAK, that impact widely used serial-to-IP converters manufactured by Lantronix and Silex. These devices are critical components in many Operational Technology (OT) environments, connecting legacy serial-based devices (like PLCs and sensors) to modern IP networks. The flaws range in severity and include critical vulnerabilities that could allow an attacker to achieve remote code execution (RCE), bypass authentication, and gain full control over the device. With thousands of these converters exposed on the public internet, these vulnerabilities represent a significant threat to the stability and security of industrial control systems (ICS) globally.
The BRIDGE:BREAK vulnerabilities encompass a wide range of issues, demonstrating systemic weaknesses in the affected products. The 22 flaws include:
Several CVEs have been assigned, including CVE-2026-32955, CVE-2026-32956, and CVE-2026-32961.
Forescout's research identified nearly 20,000 of these devices exposed to the internet, creating a large, easily accessible attack surface for threat actors.
While there is no public report of active exploitation in the wild at this time, the public disclosure of these vulnerabilities, along with their severity, means that threat actors will likely begin scanning for and attempting to exploit vulnerable devices shortly.
Successful exploitation of the BRIDGE:BREAK vulnerabilities could have severe consequences in an OT environment:
These converters are the 'digital duct tape' of the OT world, connecting old and new. A vulnerability in them is not just a software bug; it's a threat to the physical world.
The following patterns can help identify vulnerable devices or exploitation attempts:
23, HTTP 80, HTTPS 443)admin/admin)M1030 - Network Segmentation.M1051 - Update Software.Do not expose OT devices directly to the internet. Place them in a segmented network zone protected by a firewall.
Mapped D3FEND Techniques:
Apply the firmware patches provided by Lantronix and Silex to remediate the vulnerabilities.
Mapped D3FEND Techniques:
Change default credentials and enforce the use of strong, unique passwords for all device management interfaces.
Mapped D3FEND Techniques:
The single most effective countermeasure against the BRIDGE:BREAK vulnerabilities is to ensure that affected Lantronix and Silex devices are not exposed to the public internet. The fact that Forescout found nearly 20,000 devices online is a critical failure of security fundamentals. Asset owners must immediately identify these devices on their networks and place them behind a firewall, within a properly segmented OT or ICS network zone. Any required remote access should be facilitated through a secure VPN with multi-factor authentication, terminating in a DMZ, with traffic strictly controlled to the specific device. This act of network isolation removes the primary attack vector and dramatically reduces the risk of exploitation by external threat actors.
For devices that remain in operation, applying the firmware updates provided by Lantronix and Silex is mandatory. This is the only way to fix the underlying vulnerabilities, including the critical remote code execution and authentication bypass flaws. The patching process in an OT environment must be carefully managed: test the patch in a non-production environment if possible, schedule a maintenance window to minimize operational disruption, and have a rollback plan in case the update causes issues with connected legacy equipment. While patching OT can be challenging, the risk of leaving a device with known, critical RCE vulnerabilities on the network is unacceptable, especially for devices that bridge IT and OT environments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats