{"id":89977,"date":"2024-09-24T12:39:59","date_gmt":"2024-09-24T19:39:59","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/2024h1-threat-review-copy\/"},"modified":"2024-12-06T08:19:32","modified_gmt":"2024-12-06T16:19:32","slug":"draytek-dray-break","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/","title":{"rendered":"Dray:Break"},"content":{"rendered":"<h1>Dray:Break<\/h1>\n<h2>Breaking Into DrayTek Routers Before Threat Actors Do It Again<\/h2>\n<p>In 2024, routers are a primary target for cybercriminals and state-sponsored attackers \u2013 and are the riskiest device category on networks. With this knowledge, we investigated one hardware vendor, DrayTek, with a history of security flaws to help it address its issues and prevent new attacks \u2014 especially when the risk of ransomware and denial of service attacks are so high today.<\/p>\n<p>Learn what makes them vulnerable, the threat impact \u2013 and how to mitigate, today.<\/p>\n<p>\u00a0<\/p>\n<p>Watch Webinar  Get The Report<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/Vulnerabilities.svg\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n14<\/h3>\n<p class=\"c-stats__text\">New Vulnerabilities<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/Router.svg\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n704K+<\/h3>\n<p class=\"c-stats__text\">Exposed Online<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/Countries.svg\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n168<\/h3>\n<p class=\"c-stats__text\">Countries<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/Networks.svg\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n75%<\/h3>\n<p class=\"c-stats__text\">in Commercial Networks<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Explore DrayBreak Research with Vedere Labs <\/h2>\n<p>Join Elisa Costante, Vice President of Research, for a riveting discussion on the specific details of our findings and our responsible vulnerability disclosure. This webinar will discuss possible attack scenarios and their impact \u2013 including opportunities for remote network control, ransomware, DDoS, and other highly disruptive and costly cybersecurity events. Given the latest news of the FBI taking down a botnet using DrayTek products, you aren\u2019t going to want to miss this one.<\/p>\n<p><a href=\"\/webinars\/draytek-router-security-mitigating-zero-day-exploits-and-advanced-threats-od\/\" title=\"Watch Now\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<\/a><\/p>\n<h2 class=\"c-title\">Where Are the Most Exposed Routers?<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/FS-2024-VL-DrayTek-Report-HeatMap-Figure-1-V2.png\" loading=\"lazy\"><\/p>\n<p><a href=\"\/blog\/research-alert-draytek-exposed-vulnerable-routers\/\" title=\"Read Blog\" class=\"c-btn c-btn--secondary has-icon icon-duotone-triangles-right icon-position-right has-icon-animation icon-animation-fade-in\">Read Blog<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/DrayTek-Infographic-Sept-2024_WebVersions.png\" loading=\"lazy\"><\/p>\n<p><a href=\"\/resources\/draybreak-draytek-research\/\" title=\"Access The Report\" class=\"c-btn c-btn--white\">Access The Report<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/09\/FS-2024-VL-DrayTek-Report-Potential-Attack-Scenarios-Figure-4.png\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">\n<h3>Attack Scenarios<\/h3>\n<\/h2>\n<p>See the potential attack scenarios involving a vulnerable device configured to expose the Web UI over the WAN (internet). The impact? A rootkit that survives reboots and firmware updates. Network traffic is intercepted to harvest credentials and sensitive data. The ability to pivot to devices on the local network for ransomware attacks or DoS.<\/p>\n<p><a href=\"\/webinars\/draytek-router-security-mitigating-zero-day-exploits-and-advanced-threats-od\" title=\"Watch the Webinar\" class=\"c-btn c-btn--primary-dark has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch the Webinar<\/a><\/p>\n<h2 style=\"text-align: center\">Status of Routers: End of Life \/ End of Sale<\/h2>\n<p style=\"text-align: center\">Of the 704,000+ routers exposed to the internet, the majority (63%) are either End of Life (EoL) or End of Sale (EoS). What\u2019s more, 24 device models are affected by the new vulnerabilities, including 11 that are EoL. This is troublesome given many manufacturers stop security patches and updates at this stage of the product lifecycle.<\/p>\n<h4>Support Status for Exposed Routers<\/h4>\n<h4>Intended Use of Exposed Routers<\/h4>\n<p><a href=\"\/resources\/draybreak-draytek-research\/\" class=\"u-display-inline-block u-line-height-0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/Dray-Break-draytek-report_THM-1.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Dive Into the Research <\/h2>\n<p>Stay on top of this vendor\u2019s vulnerabilities, so you can know where to focus your cybersecurity and defenses. Get all the data and analysis including:<br \/>\n\u00a0\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>A technical deep dive on proof of concept attacks<\/li>\n<li>Understand the risk of ransomware, denial of service and data exfiltration<\/li>\n<li>Why we chose to investigate DrayTek<\/li>\n<li>How it was recently part of an FBI botnet takedown<\/li>\n<\/ul>\n<p><a href=\"\/resources\/draybreak-draytek-research\/\" title=\"Read Report\" class=\"c-btn c-btn--white has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n<h2 class=\"c-title\">FAQ: Dray:Break \u2013 DrayTek Routers Vulnerability Research Disclosure<\/h2>\n<h2 class=\"c-accordion__header\" data-module=\"accordion\" data-close-others=\"true\">What is DrayBreak?<\/h2>\n<p>DrayBreak is a collection of 14 newly discovered vulnerabilities in popular residential and enterprise routers manufactured by <a href=\"https:\/\/www.draytek.com\/\" target=\"new\" rel=\"noopener\">DrayTek<\/a> disclosed by Forescout Research \u2013 Vedere Labs. These vulnerabilities are significant because threat actors, including cybercriminals and state-sponsored groups, often target network infrastructure devices, such as routers, for initial access and persistence. Identifying and fixing these issues helps prevent exploitation as zero-day vulnerabilities.<\/p>\n<hr class=\"u-my-l\">\n<h2 class=\"c-accordion__header\" data-module=\"accordion\" data-close-others=\"true\">Where are DrayTek routers used? <\/h2>\n<p>Over 704,000 vulnerable DrayTek routers are exposed online across 168 countries. The UK accounts for 36% of these routers, followed by Vietnam with 17% and the Netherlands with 9%. Although many of the vulnerable devices are small residential routers, 75% are intended for business use. These affected devices are found in multiple sectors, including healthcare, retail, manufacturing, financial services, and government.<\/p>\n<hr class=\"u-my-l\">\n<h2 class=\"c-accordion__header\" data-module=\"accordion\" data-close-others=\"true\">What is the impact of the vulnerabilities? <\/h2>\n<p>Of the 14 vulnerabilities, one has the highest severity score of 10, and another is rated at 9.1. Nine vulnerabilities have medium scores and three have low scores. These vulnerabilities may allow attackers to take control of a router by injecting malicious code, maintain persistence on the device and use it as an entry point into enterprise networks.<\/p>\n<hr class=\"u-my-l\">\n<h2 class=\"c-accordion__header\" data-module=\"accordion\" data-close-others=\"true\">What can organizations do to mitigate the risk from these vulnerabilities? <\/h2>\n<p>Complete protection requires patching devices with the affected software. DrayTek has released <a href=\"https:\/\/www.draytek.com\/support\/resources\/routers#version\" target=\"new\" rel=\"noopener\">firmware patches for all affected devices<\/a>, as outlined in the table below:<\/p>\n<table>\n<tbody>\n<tr>\n<th><strong>Device Model<\/strong><\/th>\n<th><strong>Fixed versions<\/strong><\/th>\n<th><strong>EoL?<\/strong><\/th>\n<\/tr>\n<tr>\n<td>Vigor1000B, Vigor2962, Vigor3910<\/td>\n<td>4.3.2.8 and 4.4.3.1<\/td>\n<td><strong>No<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Vigor3912<\/td>\n<td>4.3.6.1<\/td>\n<td><strong>No<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Vigor165, Vigor166<\/td>\n<td>4.2.7<\/td>\n<td><strong>No<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Vigor2135, Vigor2763, Vigor2765, Vigor2766<\/td>\n<td>4.4.5.1<\/td>\n<td><strong>No<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Vigor2865, Vigor2866, Vigor2915<\/td>\n<td>4.4.5.3<\/td>\n<td><strong>No<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Vigor2620, VigorLTE200<\/td>\n<td>3.9.8.9<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Vigor2133, Vigor2762, Vigor2832<\/td>\n<td>3.9.9<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Vigor2860, Vigor2925<\/td>\n<td>3.9.8<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Vigor2862, Vigor2926<\/td>\n<td>3.9.9.5<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Vigor2952, Vigor3220<\/td>\n<td>3.9.8.2<\/td>\n<td>Yes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In addition to patching, DrayTek has recommended the following actions for <a href=\"https:\/\/www.draytek.com\/about\/security-advisory\/vigor3900-\/-vigor2960-\/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)\/\" target=\"new\" rel=\"noopener\">previous similar vulnerabilities<\/a>:<\/p>\n<ul>\n<li>If remote access is enabled on your router, disable it if not needed. Use an access control list (ACL) and two-factor authentication (2FA) if possible.<\/li>\n<li>Verify that no additional remote access profiles (VPN dial-in, teleworker or LAN to LAN) or admin users (for router admin) have been added and that no ACLs have been altered.<\/li>\n<li>Disable remote access (admin) and SSL VPN. Since the ACL does not apply to SSL VPN connections (Port 443), temporarily disable SSL VPN until the firmware is updated.<\/li>\n<li>Always back up your configuration before performing an upgrade.<\/li>\n<li>After upgrading, confirm that the web interface displays the new firmware version.<\/li>\n<li>Enable syslog logging to monitor for abnormal events.<\/li>\n<li>Always use secure protocols such as HTTPS for internet activity.<\/li>\n<li>Follow additional network security tips on <a href=\"https:\/\/www.draytek.com\/support\/knowledge-base\/5465#linux\" target=\"new\" rel=\"noopener\">DrayTek\u2019s Knowledge Base<\/a><\/li>\n<\/ul>\n<hr class=\"u-my-l\">\n<h2 class=\"c-accordion__header\" data-module=\"accordion\" data-close-others=\"true\">Where do I go for more information? <\/h2>\n<p>For more information on the vulnerabilities and mitigation strategies, <a href=\"\/blog\/research-alert-draytek-exposed-vulnerable-routers\/\">please refer to our blog<\/a>.<\/p>\n<hr class=\"u-my-l\">\n","protected":false},"excerpt":{"rendered":"<p>Dray:Break Breaking Into DrayTek Routers Before Threat Actors Do It Again In 2024, routers are a primary target for cybercriminals and state-sponsored attackers \u2013 and are the riskiest device category on networks. With this knowledge, we investigated one hardware vendor, DrayTek, with a history of security flaws to help it address its issues and prevent [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":90291,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[666],"class_list":["post-89977","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dray:Break - Forescout Research<\/title>\n<meta name=\"description\" content=\"Breaking into DrayTek routers before threat actors do it again\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dray:Break - Forescout Research\" \/>\n<meta property=\"og:description\" content=\"Breaking into DrayTek routers before threat actors do it again\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-06T16:19:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\",\"name\":\"Dray:Break - Forescout Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg\",\"datePublished\":\"2024-09-24T19:39:59+00:00\",\"dateModified\":\"2024-12-06T16:19:32+00:00\",\"description\":\"Breaking into DrayTek routers before threat actors do it again\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg\",\"width\":800,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dray:Break\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dray:Break - Forescout Research","description":"Breaking into DrayTek routers before threat actors do it again","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/","og_locale":"en_US","og_type":"article","og_title":"Dray:Break - Forescout Research","og_description":"Breaking into DrayTek routers before threat actors do it again","og_url":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-12-06T16:19:32+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/","url":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/","name":"Dray:Break - Forescout Research","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg","datePublished":"2024-09-24T19:39:59+00:00","dateModified":"2024-12-06T16:19:32+00:00","description":"Breaking into DrayTek routers before threat actors do it again","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/draytek-dray-break\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Dray:Break"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/10\/DrayBreak-Webinar-Feature.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=89977"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/89977\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/90291"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=89977"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=89977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}