{"id":64297,"date":"2021-06-17T03:34:41","date_gmt":"2021-06-17T10:34:41","guid":{"rendered":"http:\/\/forescout.local\/?page_id=64297"},"modified":"2025-03-25T11:30:16","modified_gmt":"2025-03-25T15:30:16","slug":"research-labs-overview","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs-overview\/","title":{"rendered":"Vulnerability Research Overview"},"content":{"rendered":"<h1>Vulnerability Research<\/h1>\n<h3>Original Cyber Vulnerability Research<\/h3>\n<p>Forescout Vedere Labs presents its findings about the riskiest devices in enterprise network for 2023, including seven device types that are new to the list this year: VPN gateways and security appliances in IT; NAS and OOBM in IoT; engineering workstations and RTUs in OT; and blood glucose monitors in IoMT.<\/p>\n<p>\u00a0<\/p>\n<p>Watch Latest Research Webinar Read Disclosure<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title u-color-primary-400\">Latest Research Reports<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">SUN:DOWN &#8211; A Dark Side to Power Grids<\/h3>\n<p><strong>Mar. 27, 2025<\/strong><br \/>\nGround-breaking research discovers new vulnerabilities that make dangerous attacks on the power grid and smart-home devices possible. Three solar power vendors \u2013 Sungrow, SMA, and Growatt \u2013 have nearly 50 flaws, collectively, that could lead to grid disruption and potential blackouts.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/research-labs\/sun-down-a-dark-side-to-solar-energy-grids\/\" title=\"Overview\" class=\"c-btn c-btn--primary c-btn--link\">Overview<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/webinars\/sun-down-research-webinar\/\" title=\"Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Webinar<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/blog\/grid-security-new-vulnerabilities-in-solar-power-systems-exposed\/\" title=\"Blog\" class=\"c-btn c-btn--primary c-btn--link\">Blog<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/press-releases\/forescout-vedere-labs-uncovers-severe-systemic-security-risks-in-global-solar-power-infrastructure\/\" title=\"Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Press Release<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/sun-down-research-report\/\" title=\"Full Report (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Full Report (PDF)<\/a><\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/sun-down-research-slides\/\" title=\"Presentation Slides (PDF)\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Presentation Slides (PDF)<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/Dray-Break-draytek-report_THM.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Dray:Break &#8211; Breaking into DrayTrek Routers Before Threat Actors Do It Again<\/h3>\n<p><strong>Oct. 2, 2024<\/strong><br \/>\nIn 2024, routers are a primary target for cybercriminals and state-sponsored attackers \u2013 and are the riskiest device category on networks. With this knowledge, we investigated one hardware vendor, DrayTek, with a history of security flaws to help it address its issues and prevent new attacks \u2014 especially when the risk of ransomware attacks are so high today. Learn what makes them vulnerable, the threat impact \u2013 and how to mitigate today.\n\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/draybreak-draytek-research\/\" title=\"Get Research Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Get Research Report<\/a><\/li>\n<li><a href=\"\/blog\/research-alert-draytek-exposed-vulnerable-routers\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/press-releases\/14-vulnerabilities-draytek-routers\/\" title=\"Read Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Read Press Release<\/a><\/li>\n<li><a href=\"\/webinars\/draytek-router-security-mitigating-zero-day-exploits-and-advanced-threats-od\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<li><a href=\"\/research-labs\/draytek-dray-break\/\" title=\"Learn More\" class=\"c-btn c-btn--primary c-btn--link\">Learn More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-KEV-Exploited-Report-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Exposing the Exploited: A quantitative analysis of vulnerabilities under the radar<\/h3>\n<p>The speed of accurate security vulnerability information matters. Vulnerabilities are being discovered and weaponized in the wild faster than ever before. Unfortunately, authoritative naming catalogs can\u2019t keep up. Our latest research analyzes the landscape of exploited vulnerabilities \u2014 and reinforces the need for more sources of threat intelligence.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/exposing-the-exploited-analyzing-vulnerabilities-that-live-in-the-wild\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/exposing-the-exploited-a-quantitative-analysis-of-vulnerabilities-under-the-radar\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/press-releases\/new-research-exposing-the-exploited-unveils-challenges-of-the-known-exploited-vulnerability-catalog\/\" title=\"Read Press Release\" class=\"c-btn c-btn--primary c-btn--link\">Read Press Release<\/a><\/li>\n<li><a href=\"\/webinars\/exposing-the-exploited\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/big-FS-2023-VL-Sierra-21-Thumb-v1-440x554-1.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Sierra:21 &#8211; Attack Surface Expansion in OT\/IoT Routers<\/h3>\n<p>Forescout\u2019s Vedere Labs has identified 21 new vulnerabilities that affect OT\/IoT routers and increase the risk exposure to critical infrastructure. The affected products are prevalent in multiple industries, particularly healthcare and manufacturing, but also technology, financial services, government, and power generation. The research details specific attack scenarios as well as potential mitigation techniques.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"https:\/\/www.forescout.com\/blog\/sierra21-supply-chain-vulnerabilities-iot-ot-routers\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/sierra21-vulnerabilities\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=602171\" title=\"Watch the Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch the Webinar<\/a><\/li>\n<li><a href=\"\/research-labs\/sierra21\/\" title=\"Learn More\" class=\"c-btn c-btn--primary c-btn--link\">Learn More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/MicrosoftTeams-image-29.png\" alt=\"OT Icefall Conclusion\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">OT:ICEFALL Conclusion Report<\/h3>\n<p>Forescout Vedere Labs has discovered a set of 61 vulnerabilities affecting devices from 13 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation.<\/p>\n<p><a href=\"\/research-labs\/ot-icefall\/\" title=\"Learn More\" class=\"c-read-more\">Learn More<\/a><\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ot-icefall\/\" title=\"Learn More\" class=\"c-btn c-btn--primary c-btn--link\">Learn More<\/a><\/li>\n<li><a href=\"\/blog\/ot-icefall-ot-security-design-and-patching\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/concluding-ot-icefall-report\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=586816\" title=\"View Webinar\" class=\"c-btn c-btn--primary c-btn--link\">View Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/FS-2023-BGP-Report-Thumb-v1-440x554-1.png\" alt=\"BGP Report\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Analyzing the Security of BGP Message Parsing<\/h3>\n<p>This report discusses an often-overlooked aspect of Border Gateway Protocol (BGP) security: vulnerabilities in its software implementations. More specifically, vulnerabilities in BGP message parsing that could be exploited by attackers to achieve a denial of service (DoS) condition on vulnerable BGP peers.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/analyzing-the-security-of-bgp-message-parsing\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/three-new-bgp-message-parsing-vulnerabilities-disclosed-in-frrouting-software\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=581464\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/deep-lateral-movement-THM.png\" alt=\"Deep Lateral Movement\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Deep Lateral Movement in OT Networks<\/h3>\n<p>Forescout\u2019s Vedere Labs presents the first systematic study into deep lateral movement: how advanced adversaries can move laterally among devices at the controller level of OT networks. This tactic allows advanced threat actors to gain deep access to industrial control systems and cross often overlooked security perimeters to perform granular, stealthy manipulations to override functional and safety limitations of controllers.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/l1-lateral-movement-report\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/deep-lateral-movement-in-ot-networks-when-is-a-perimeter-not-a-perimeter\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/icefall-cover.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">OT:ICEFALL &#8211; A Decade of Insecure-by-Design Practices in OT<\/h3>\n<p>Forescout\u2019s Vedere Labs has discovered a total of 59 vulnerabilities affecting devices from 12 operational technology (OT) vendors caused by insecure-by-design practices in OT. The affected products are known to be prevalent in industries such as oil and gas, chemical, nuclear, power generation and distribution, manufacturing, water treatment and distribution, mining, and building automation.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ot-icefall\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/ot-icefall-56-vulnerabilities-caused-by-insecure-by-design-practices-in-ot\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=547880\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<li><a href=\"\/resources\/ot-icefall-faq\/\" title=\"Access FAQ\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access FAQ<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-07-at-3.21.05-PM.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Access:7 &#8211; How Supply Chain Vulnerabilities Can Allow Unwelcomed Access to Medical and IoT Devices<\/h3>\n<p>Forescout\u2019s Vedere Labs and CyberMDX discovered <a href=\"\/research-labs\/access7\/\">seven supply chain vulnerabilities<\/a>, including three that are rated critical by CISA, impacting medical and IoT devices that present an immediate risk to healthcare organizations, as well as the financial services and manufacturing sector.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-iot-devices\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/access-7-vulnerabilities-impact-supply-chain-component-in-medical-and-iot-device-models\/\" title=\"Read The Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read The Blog<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=533908\" title=\"Watch The Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch The Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/03\/Screen-Shot-2022-03-07-at-3.18.01-PM.png\" alt=\"Dissecting the Nucleus TCP\/IP Stack\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">NUCLEUS:13 &#8211; Dissecting the Nucleus TCP\/IP Stack<\/h3>\n<p>Vedere Labs, with support from Medigate Labs, have discovered a set of <a href=\"\/research-labs\/nucleus-13\/\">13 new vulnerabilities<\/a> affecting the Nucleus TCP\/IP stack, which we are collectively calling NUCLEUS:13. These vulnerabilities allow for remote code execution, denial of service, and information leak. Nucleus has been in use for nearly 30 years in safety-critical devices, such as anesthesia machines, patient monitors, and others in healthcare.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/nucleus13-research-report-dissecting-the-nucleus-tcpip-stack\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/new-critical-vulnerabilities-found-on-nucleus-tcp-ip-stack\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/nucleus13-faq-tcpip-vulnerability-research-disclosure\/\" title=\"Get FAQ\" class=\"c-btn c-btn--primary c-btn--link\">Get FAQ<\/a><\/li>\n<li><\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/07\/INFRA-HALT-report-cover.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">INFRA:HALT &#8211; Jointly discovering and mitigating large-scale OT vulnerabilities<\/h3>\n<p>Vedere Labs and JFrog Security Research discover <a href=\"\/research-labs\/infra-halt\/\">14 new vulnerabilities<\/a> affecting closed source TCP\/IP stack NicheStack, allowing for Denial of Service or Remote Code Execution primarily affecting operational technology (OT) and industrial control system (ICS) devices.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/infrahalt-discovering-mitigating-large-scale-ot-vulnerabilities\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/blog\/new-critical-operational-technology-vulnerabilities-found-on-nichestack\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/infrahalt-nichestack-tcpip-vulnerability-research-disclosure-faq\/\" title=\"Get FAQ\" class=\"c-btn c-btn--primary c-btn--link\">Get FAQ<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/support-options.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">NAME:WRECK \u2013 9 DNS Vulnerabilities<\/h3>\n<p>Vedere Labs, partnering with JSOF Research, disclosed <a href=\"\/research-labs\/namewreck\/\">NAME:WRECK<\/a>, a set of nine Domain Name System (DNS) vulnerabilities that impact four TCP\/IP stacks and affect 100+ million IoT devices with the potential to cause either Denial of Service (DoS) or Remote Code Execution, allowing attackers to take targeted devices offline or to gain control over them. Read the report to learn how to protect enterprise IT, IoT and OT devices.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/namewreck-breaking-and-fixing-dns-implementations\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/company\/blog\/forescout-and-jsof-disclose-new-dns-vulnerabilities-impacting-millions-of-enterprise-and-consumer-devices\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/namewreck-faq\/\" title=\"Get FAQ\" class=\"c-btn c-btn--primary c-btn--link\">Get FAQ<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/numberjack-thumbnail.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">NUMBER:JACK \u2013 Weak ISN Generation in Embedded TCP\/IP Stacks<\/h3>\n<p>In the second study of Project Memoria, Vedere Labs discovers NUMBER:JACK, a set of vulnerabilities related to ISN generation that can be used to hijack or spoof TCP connections.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/blog\/numberjack-forescout-research-labs-finds-nine-isn-generation-vulnerabilities-affecting-tcpip-stacks\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--link\">Read Blog<\/a><\/li>\n<li><a href=\"\/resources\/numberjack-weak-isn-generation-in-embedded-tcpip-stacks\/\" title=\"Get Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Get Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/anmesia33-thumbnail.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">AMNESIA:33 \u2013 33 Memory-Corruption Vulnerabilities <\/h3>\n<p>Vedere Labs discovered <a href=\"\/research-labs\/amnesia33\/\">33 new memory-corruption vulnerabilities<\/a> that impact open source TCP\/IP stacks \u2013 four scoring as critical. The report details how enterprises can identify these risks and take protective action to avoid breaches.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/amnesia33-identify-and-mitigate-the-risk-from-vulnerabilities-lurking-in-millions-of-iot-ot-and-it-devices\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<li><a href=\"\/resources\/amnesia33-faq\/\" title=\"Get FAQ\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Get FAQ<\/a><\/li>\n<li><a href=\"\/webinars\/?webinar=457922\" title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--link\">Watch Webinar<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/healtcare-report-cover.jpg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">New Research Identifies Security Risks in Healthcare<\/h3>\n<p>Analysis of healthcare delivery organizations reveals insights into increased attack surfaces and security risks.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/connected-medical-device-security-report\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/Screen-Shot-2021-06-30-at-5.20.33-PM.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Rise of the Machines \u2013 Transforming Cybersecurity Strategy for the Age of IoT<\/h3>\n<p>This research paper dives into the Internet of Things (IoT) revolution, the risks and challenges it brings and how to transform your cybersecurity strategy to protect your enterprise network in the age of IoT.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/transforming-cybersecurity-strategy-for-the-iot\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/BAS-Research-Report-Cover.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">BAS Research Report: The Current State of Smart Building Cybersecurity<\/h3>\n<p>The Forescout OT Research Team offers an analysis of its vulnerability and malware research for devices commonly used in building automation system (BAS) networks.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/resources\/bas-research-report-the-current-state-of-smart-building-cybersecurity-2\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--link\" target=\"_blank\">Access Report<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-pc-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Dell Wyse Thin Client Vulnerability<\/h3>\n<p>covers two vulnerabilities discovered by Vedere Labs (formerly CyberMDX) and published by Dell on the 21st of December 2020 as CVE-2020-29491 and CVE-2020-29492. The vulnerabilities affect Dell Wyse Thin client devices and once exploited allow attackers to, among other things, remotely run malicious code and access arbitrary files on affected devices.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/dell-wyse-thin-client-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-mri-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">GE Radiology Vulnerability<\/h3>\n<p>MDhex-Ray is a vulnerability discovered by Vedere Labs (formerly CyberMDX) and published by CISA on the 8th of December 2020 as CVE-2020-25179. MDhex-Ray affects a long list of CT, X-Ray, and MRI imaging systems manufactured by GE Healthcare. Successfully exploiting the vulnerability may expose sensitive data \u2013 such as PHI \u2013 or could allow the attacker to run arbitrary code, which might impact the availability of the system and allow manipulation of PHI.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ge-radiology-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-networking-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Ripple20 Vulnerability<\/h3>\n<p>Vedere Labs Team (formerly CyberMDX) Assisted JSOF Research Team In Disclosing 19 Vulnerabilities Found In the Treck Network Stack.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ripple20-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-monitor-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">MDhex Vulnerability<\/h3>\n<p>Affecting a range of CARESCAPE patient monitoring devices manufactured by GE Healthcare, the bundle of vulnerabilities collectively disclosed in CISA Advisory ICSMA-20-023-01, first came to the attention of CyberMDX, a Forescout Company security researchers through an investigation into the CIC Pro device.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/mdhex-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-monitor-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">GE Anesthesia and Respiratory Device Vulnerability<\/h3>\n<p>Vedere Labs\u2019 (formerly CyberMDX) research team discovered a vulnerability related to the GE Aestiva and GE Aespire devices (models 7100 and 7900). If an attacker gains access to a hospital\u2019s network and if the GE Aestiva or GE Aespire devices are connected via terminal servers, the attacker can force the device(s) to revert to an earlier, less secure version of the communication protocol and remotely modify parameters without authorization. When deployed using terminal servers, these manipulations can also be performed without any prior knowledge of IP addresses or location of the anesthesia machine.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/ge-anesthesia-and-respiratory-device-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-pump-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">BD Alaris AGW Firmware Vulnerability<\/h3>\n<p>A previously undocumented vulnerability in the device, noting that the AlarisTM Gateway workstation supports a firmware upgrade that can be executed without any predicate authentication or permissions. Conducting a counterfeit version of this upgrade can allow bad actors a route to \u201cauthenticate\u201d malicious content.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/bd-alaris-agw-firmware-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-pump-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">BD Alaris AGW Web Management Vulnerability<\/h3>\n<p>a previously undocumented vulnerability in the device, noting that the web management system doesn\u2019t require credentials and doesn\u2019t allow for password protection. As a result, anyone knowing the IP address of a targeted workstation can: monitor pump statuses, access event logs, and user guide; change the gateway\u2019s network configuration; restart the gateway (after changing the configuration you are permitted to restart).<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/bd-alaris-agw-web-management-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-pump-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">BD Alaris TIVA Syringe Pump Vulnerability<\/h3>\n<p>Vedere Labs (formerly CyberMDX) discovered a previously undocumented vulnerability in the device, noting that when the syringe is connected to a network, it is left exposed to remote control from anyone on that network, requiring no authentication. The remote control allows starting\/stopping of the pump, changing its rate, silencing alarms, and more.<\/p>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/bd-alaris-tiva-syringe-pump-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/technation-torpedovulnerable-networking-fs-branding.png\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-color-primary-900\">Qualcomm Life Capsule Datacaptor Terminal Server Vulnerability<\/h3>\n<ul class=\"o-list-bare o-flow o-flow--small u-m-0\">\n<li><a href=\"\/research-labs\/qualcomm-life-capsule-datacaptor-terminal-server-vulnerability\/\" title=\"Read More\" class=\"c-btn c-btn--primary c-btn--link\">Read More<\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/ornament-dots.svg\" loading=\"lazy\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/support-options-icon.png\" loading=\"lazy\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Research Original Cyber Vulnerability Research Forescout Vedere Labs presents its findings about the riskiest devices in enterprise network for 2023, including seven device types that are new to the list this year: VPN gateways and security appliances in IT; NAS and OOBM in IoT; engineering workstations and RTUs in OT; and blood glucose monitors [&hellip;]<\/p>\n","protected":false},"author":145,"featured_media":0,"parent":0,"menu_order":148,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[662],"class_list":["post-64297","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Research Overview - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Research Overview - Forescout\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Research Original Cyber Vulnerability Research Forescout Vedere Labs presents its findings about the riskiest devices in enterprise network for 2023, including seven device types that are new to the list this year: VPN gateways and security appliances in IT; NAS and OOBM in IoT; engineering workstations and RTUs in OT; and blood glucose monitors [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T15:30:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"26 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs-overview\/\",\"name\":\"Vulnerability Research Overview - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\",\"datePublished\":\"2021-06-17T10:34:41+00:00\",\"dateModified\":\"2025-03-25T15:30:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs-overview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\",\"width\":440,\"height\":554},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs-overview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Research Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Research Overview - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs-overview\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Research Overview - Forescout","og_description":"Vulnerability Research Original Cyber Vulnerability Research Forescout Vedere Labs presents its findings about the riskiest devices in enterprise network for 2023, including seven device types that are new to the list this year: VPN gateways and security appliances in IT; NAS and OOBM in IoT; engineering workstations and RTUs in OT; and blood glucose monitors [&hellip;]","og_url":"https:\/\/www.forescout.com\/research-labs-overview\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-03-25T15:30:16+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"26 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs-overview\/","url":"https:\/\/www.forescout.com\/research-labs-overview\/","name":"Vulnerability Research Overview - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp","datePublished":"2021-06-17T10:34:41+00:00","dateModified":"2025-03-25T15:30:16+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs-overview\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp","width":440,"height":554},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Research Overview"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/64297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=64297"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/64297\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=64297"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=64297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}