BRIDGE:BREAK Flaws Expose 20,000 Devices


22 BRIDGE:BREAK flaws expose 20,000+ devices, enabling takeover, data tampering, and attacks on critical infrastructure systems.

April 21, 2026 – Cybersecurity researchers have uncovered a set of critical vulnerabilities, collectively named “BRIDGE:BREAK,” affecting tens of thousands of industrial networking devices worldwide.

The flaws, identified by Forescout’s Vedere Labs, impact serial-to-IP converters manufactured by Lantronix and Silex hardware widely used to connect legacy industrial systems to modern networks.

In total, 22 vulnerabilities were discovered across multiple device models, with researchers estimating that nearly 20,000 internet-exposed systems could be at risk globally.

The vulnerabilities include critical issues such as remote code execution, authentication bypass, firmware tampering, and denial-of-service (DoS). Exploitation could allow attackers to gain full control of affected devices, disrupt communications, or manipulate data being transmitted between industrial systems.

Serial-to-IP converters play a key role in industries like energy, healthcare, and manufacturing by enabling remote access to legacy equipment. However, their exposure to the internet and weak security controls make them an attractive target for threat actors.

Researchers warned that attackers could leverage these flaws to move laterally within networks or tamper with operational data potentially altering sensor readings or interfering with automated processes in critical environments.

In one possible attack scenario, a threat actor could first compromise an internet-facing edge device, such as a router, before exploiting the BRIDGE:BREAK vulnerabilities to access connected industrial systems and manipulate data flows.

Both affected vendors have released security updates addressing the issues. Experts urge organizations to apply patches immediately, avoid exposing such devices to the internet, and strengthen network segmentation to limit potential attack paths.

Related articles :


Reports are sourced from official documents, law-enforcement updates, and credible investigations.

Discover additional reports, market trends, crime analysis and Harm Reduction articles on DarkDotWeb to stay informed about the latest dark web operations.