38 Vulnerabilities Discovered in Wireless Industrial IoT Devices, Threatening Critical Infrastructure

Share This Post

38 security weaknesses have been found in wireless Industrial Internet of Things (IIoT) devices from four different vendors, presenting a significant attack surface for cybercriminals targeting operational technology (OT) environments. The vulnerabilities offer remote entry points for attacks, enabling unauthenticated actors to gain a foothold and spread to other systems, potentially causing significant damage. Some of the weaknesses can even be used to directly access thousands of internal OT networks over the internet. Of the 38 flaws, 3 affect ETIC Telecom’s Remote Access Server and 5 affect InHand Networks’ InRouter 302 and InRouter 615. The findings highlight the risk of making IIoT devices directly accessible on the internet and creating a “single point of failure” that can bypass all security protections. Countermeasures include disabling insecure encryption schemes, hiding Wi-Fi network names, and preventing devices from being publicly accessible.

https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html



Reach out to our incident response team for help

More To Explore

Information Security News – 5/19/2025

Attackers Lace Fake Generative AI Tools With ‘Noodlophile’ Malware Article Link: https://www.darkreading.com/endpoint-security/attackers-fake-generative-ai-tools-malware CISA Reverses Decision on Cybersecurity Advisory Changes Article Link: https://www.infosecurity-magazine.com/news/cisa-reverses-decision-advisory/ FBI Warns That

Information Security News – 5/12/2025

Microsoft Sets Passkeys Default for New Accounts Article Link: https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html Accenture: What We Learned When Our CEO Got Deepfaked Article Link: https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked Ghost Students Creating

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.