38 Vulnerabilities Discovered in Wireless Industrial IoT Devices, Threatening Critical Infrastructure

Share This Post

38 security weaknesses have been found in wireless Industrial Internet of Things (IIoT) devices from four different vendors, presenting a significant attack surface for cybercriminals targeting operational technology (OT) environments. The vulnerabilities offer remote entry points for attacks, enabling unauthenticated actors to gain a foothold and spread to other systems, potentially causing significant damage. Some of the weaknesses can even be used to directly access thousands of internal OT networks over the internet. Of the 38 flaws, 3 affect ETIC Telecom’s Remote Access Server and 5 affect InHand Networks’ InRouter 302 and InRouter 615. The findings highlight the risk of making IIoT devices directly accessible on the internet and creating a “single point of failure” that can bypass all security protections. Countermeasures include disabling insecure encryption schemes, hiding Wi-Fi network names, and preventing devices from being publicly accessible.

https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html



Reach out to our incident response team for help

More To Explore

Information Security News – 12/8/2025

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs into Spyware Article link: https://thehackernews.com/2025/12/shadypanda-turns-popular-browser.html University of Pennsylvania Joins Victims of Clop’s Oracle EBS Raid Article

Information Security News – 12/1/2025

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist Article Link: https://thehackernews.com/2025/11/qilin-ransomware-turns-south-korean-msp.html Emergency Alerts Go Dark After Cyberattack on OnSolve CodeRED

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.