Forescout Research Reveals Riskiest Network Devices in 2024

0

Cybersecurity company Forescout Technologies has released its fourth annual review of data sourced from nearly 19 million devices through its research arm, Vedere Labs. The report, The Riskiest Connected Devices in 2024, found that attackers are crossing siloes to find entry points across the full spectrum of devices, operating systems, and embedded firmware

“The device has evolved from a pure asset to a reliable, sophisticated, intelligent platform for communications and services, driving a transformation in the relationship between devices, people, and networks,” said Forescout Threat Research VP Elisa Costante. “We analyse millions of data points to publish the Riskiest Connected Devices report to integrate important threat context into how organisations use different devices and to redefine what it means to connect and interact securely.”

“Forescout is committed to delivering device threat intelligence that helps organisations respond faster to potential threats and take advantage of opportunities to enhance security postures,” she added.

The Riskiest Connected Devices in 2024 report identifies the five riskiest device types in four categories; IT, IoT, OT and IoMT. Key highlights include:

Most Risky: IT Devices

IT devices – network infrastructure and endpoints – still account for the most vulnerabilities at 58% despite being down from 78% in 2023.

Network infrastructure devices – routers and wireless access points – are often exposed online and have dangerous open ports. Endpoints – servers, computers and hypervisors – remain high-risk as entry points for phishing or because of unpatched systems and applications.

At the beginning of 2023, endpoints were riskier than network devices. At the end of 2023, there was a reversal in the number of vulnerabilities found and exploited in network infrastructure devices. Today, network equipment has become the riskiest IT device category surpassing endpoints.

Persistent Risk: IoT Devices

IoT devices with vulnerabilities expanded by 136% since 2023. The riskiest IoT devices include the most persistent suspects – NAS, VoIP, IP cameras and printers. These are commonly exposed on the internet and have been historically targeted by attackers. This year’s analysis uncovered one IoT device making the riskiest connected devices list for the first time; the network video recorder (NVR).

NVRs sit alongside IP cameras on a network to store recorded video. Like IP cameras, they are commonly found online and have significant vulnerabilities that cybercriminal botnets and APTs have exploited.

Ubiquitous and Insecure: OT Devices

Industrial robots debut as an area of emerging risk for OT devices. The riskiest OT devices include the critical and insecure-by-design PLCs and DCSs. It also consists of the UPSs in many data centres with default credentials and the ubiquitous, often invisible building automation systems.

Industrial robots make the list of riskiest connected devices for the first time. Often used in logistics and military applications, robots are growing in use in industries like electronics and automotive manufacturing. Many robots share the same security challenges as other OT equipment, including outdated software, default credentials, and lax security postures.

Notable Changes in Healthcare Device Security: IoMT Devices

Healthcare is no longer the industry with the riskiest devices, but IT equipment for medication dispensing systems is the second-most exposed IoMT device type.

Just one year after the 2023 analysis highlighted the high level of device risk within the healthcare industry, our research today indicates that many organisations are closing ports by replacing remote management of devices from Telnet to SSH. Healthcare marked the highest decrease in open ports from 10% in 2023 to just 4% this year. Healthcare also had the highest decline in RDP from 15% to just 6%.

Despite this good news, IoMT devices, the IT equipment used for healthcare like medical information systems and workstations, continue to pose a risk for the industry, especially in medication dispensing systems. Medication dispensers have been known to be vulnerable for almost a decade, yet they represent the sixth most vulnerable device type overall and the second most in the category.

“Modern risk and exposure management must include devices in every category, to identify, prioritise and reduce risk across the whole organisation,” adds Costante. “Beyond risk assessment, risk mitigation should use automated controls that don’t rely only on security agents and which also apply to the whole enterprise instead of silos like the IT network, the OT network, or specific types of IoT devices.”

Among the immediate steps organisations can take to reduce device risk are:

  • Upgrade, replace or isolate OT and IoMT devices running legacy operating systems known to have critical vulnerabilities;
  • Implement automated device compliance verification and enforcement to ensure non-compliant devices cannot connect to the network; and
  • Improve network security efforts, including segmentation, to isolate common, exposed devices such as IP cameras and dangerous open ports such as Telnet.
  • Understanding the perceptions of the riskiest devices is vital to define a roadmap for the key elements of cyber defense to reduce risk.

You can read the full report here.

Share.