Several flaws found in serial-to-IP converters used in critical sectors

SCM feed for Latest

Overview

Forescout Technologies has discovered 20 security vulnerabilities in Sliex and Lantronix serial-to-IP converters, commonly used in sectors like healthcare and operational technology. These vulnerabilities can be exploited without any authentication, meaning attackers could potentially gain remote access to critical systems. This is a serious concern, as these converters play a vital role in enabling communication between devices. The exposure could lead to unauthorized control or data breaches, impacting patient care and industrial operations. Organizations relying on these devices need to take immediate action to protect their systems from potential attacks.

Key Takeaways

  • Affected Systems: Sliex and Lantronix serial-to-IP converters
  • Action Required: Organizations should implement security patches as they become available and consider isolating affected devices from critical networks until updates are applied.
  • Timeline: Newly disclosed

Original Article Summary

SecurityWeek reports that Forescout Technologies identified 20 new vulnerabilities in Sliex and Lantronix serial-to-IP converters, or serial device servers, that can be exploited without authentication, potentially exposing healthcare, operational technology, and other systems to remote attacks.

Impact

Sliex and Lantronix serial-to-IP converters

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Organizations should implement security patches as they become available and consider isolating affected devices from critical networks until updates are applied.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Vulnerability, Critical.

Related Coverage

Report: FTP protocol security gaps expose millions of systems

SCM feed for Latest

A recent report indicates that approximately half of the 6 million internet-connected systems using the outdated File Transfer Protocol (FTP) are not secured with encryption. This lack of encryption makes these systems particularly vulnerable to cyberattacks, as attackers can easily intercept sensitive data during file transfers. The findings, reported by SecurityWeek, raise concerns for organizations relying on FTP for data transfer, as they may unwittingly expose critical information to cybercriminals. Given the prevalence of FTP usage, the implications of these security gaps could be widespread, impacting various industries. Companies should prioritize upgrading to more secure file transfer methods to protect their data from potential breaches.

Apr 21, 2026

Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks

CyberScoop

During a recent House Homeland Security Committee hearing, lawmakers discussed the rising issue of ransomware attacks targeting hospitals. These attacks have significant implications for patient care and safety, leading to concerns that they may warrant designations as terrorism or even homicide charges against perpetrators. The discussions reflect growing frustration over the frequency and severity of these attacks, which not only disrupt healthcare services but can also endanger lives. As ransomware incidents increase, lawmakers are considering more serious legal consequences to deter future attacks and protect vulnerable healthcare systems from cybercriminals. This initiative highlights the urgent need for stronger cybersecurity measures in the healthcare sector.

Apr 21, 2026

New Lotus data wiper used against Venezuelan energy, utility firms

BleepingComputer

Researchers have identified a new type of data-wiping malware called Lotus, which was used in targeted attacks against energy and utility companies in Venezuela last year. This malware is particularly concerning as it specifically targets critical infrastructure, potentially disrupting essential services. The attacks indicate a growing trend of cyber threats aimed at destabilizing operations in the energy sector, which can have far-reaching consequences for both companies and the general public. Organizations in similar sectors should be vigilant and enhance their cybersecurity measures to protect against such threats. The emergence of Lotus highlights the ongoing risks faced by utilities worldwide.

Apr 21, 2026

North Korea’s Lazarus APT stole $290M from Kelp DAO

Security Affairs

The Lazarus Group, a hacking group linked to North Korea, successfully stole $290 million from Kelp DAO, a decentralized finance protocol on the Ethereum network. The theft was facilitated by exploiting vulnerabilities in LayerZero, a cross-chain messaging protocol. A subsequent attempt to steal an additional $95 million was thwarted by security measures. This incident raises significant concerns about the security of DeFi protocols and highlights the ongoing risks posed by state-sponsored cybercriminals in the cryptocurrency space. The implications are serious for investors and users of decentralized finance, as such breaches can undermine trust in these platforms.

Apr 21, 2026

Sysdig report signals end of human-led cloud defense

SCM feed for Latest

Loris Degioanni, the founder and CTO of Sysdig, announced that many organizations are moving away from traditional human-led cloud security measures. According to recent data, over 70% of security teams are now using behavior-based runtime detection methods to secure their cloud environments. This shift indicates a growing reliance on automated systems to identify and respond to security threats. As cloud infrastructures become more complex, the need for real-time, automated responses is becoming critical. This change could significantly impact how companies manage security and protect their digital assets moving forward.

Apr 21, 2026

Fortinet architect warns of OT cloud convergence risk

SCM feed for Latest

Federal agencies in the U.S. are facing significant security challenges as they modernize their systems under new fiscal mandates for 2026. Robert Imhof, a federal architect at Fortinet, warns that the merging of cloud services, IT, and operational technology has outpaced existing security measures, which are often disjointed and ineffective. This lack of visibility creates vulnerabilities that could be exploited by cybercriminals. As agencies rush to update their infrastructures, they need to prioritize the integration of their security architectures to protect against potential attacks. This situation affects not only government operations but could also have broader implications for national security and public safety.

Apr 21, 2026