New Device Categories - Rising Risks in Enterprise Networks

Forescout's latest research highlights the rising risks associated with new device categories in enterprise networks, particularly focusing on vulnerabilities in serial-to-IP converters that could impact critical infrastructure.

Industry NewsHIGHUpdated: Published: 📰 2 sources

Original Reporting

HNHelp Net Security·Sinisa Markovic

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯As companies add more types of devices to their networks, they become more vulnerable to cyberattacks. New research shows that some of these devices, especially serial-to-IP converters, have serious security flaws that could let hackers cause big problems. It's important for businesses to keep their devices safe and updated.

What Happened

In a significant shift, Forescout's 2026 Riskiest Devices research reveals that enterprise networks are increasingly vulnerable due to the addition of new device categories. This year, 11 new riskiest asset types have entered the rankings, marking the second-largest year-over-year increase on record. Among these, serial-to-IP converters and workstations have quickly ascended to the top five riskiest IT assets, underscoring the growing complexity of securing modern enterprise environments.

Forescout's latest findings also highlight 22 previously unknown vulnerabilities in serial-to-IP converters, devices that bridge legacy industrial equipment with modern networks. Thousands of these systems are currently exposed online, significantly increasing the risk of cyberattacks across critical infrastructure sectors.

The research emphasizes how the attack surface is expanding across various domains, including IT, IoT, OT, and IoMT. As organizations integrate more connected devices, they inadvertently create more opportunities for threat actors to exploit vulnerabilities.

Who's Affected

The findings indicate that financial services and government sectors are particularly at risk. Financial services have the highest average device risk, more than three times that of retail. Government institutions follow closely, with their risk levels more than double those of the manufacturing sector. This disparity emphasizes the urgent need for these industries to enhance their security measures. Organizations are challenged by the presence of embedded firmware and special operating systems that complicate inventory and patch management. As these sectors lead in device risk, they must prioritize security strategies that address vulnerabilities across all connected environments.

What Data Was Exposed

The report reveals that the top five riskiest IT assets include routers, serial-to-IP converters, workstations, firewalls, and domain controllers. Notably, routers are identified as the highest-risk category, averaging 32 vulnerabilities per device. In the IoT realm, devices such as VoIP systems and network video recorders are also flagged as high-risk.

In the realm of IoMT, healthcare-related devices like medication dispensing systems and MRI scanners lead the risk rankings. The 2026 list now encompasses 20 different device types, spanning the four domains, indicating a growing concern for organizations that rely on a diverse array of connected devices. The vulnerabilities in serial-to-IP converters could allow attackers to disrupt operations, tamper with sensitive data, or even take control of affected devices.

What You Should Do

Organizations must adopt a holistic security approach that encompasses all device types across IT, IoT, and OT environments. Focusing security efforts on a single domain is no longer sufficient, as attackers are increasingly exploiting weaknesses across multiple environments. To mitigate risks, enterprises should: By taking these proactive measures, organizations can better safeguard their networks against the evolving landscape of cyber threats.

Do Now

  • 1.Conduct regular inventory assessments to identify all connected devices.
  • 2.Implement automated patch management to ensure devices are up-to-date.
  • 3.Train staff on recognizing potential threats and vulnerabilities.

Do Next

  • 4.Collaborate across departments to enhance visibility and response capabilities.
  • 5.Apply vendor patches as soon as they are available, remove default credentials, and enforce strong authentication.
  • 6.Ensure that devices are not directly exposed to the internet and utilize network segmentation to limit potential attack vectors.

🔒 Pro Insight

The findings from Forescout underscore the growing complexity of securing enterprise networks as new device categories emerge, particularly in critical sectors like financial services and government. Organizations must prioritize comprehensive security strategies to address these vulnerabilities effectively.

Related Pings