Sydney, AU, 17 July 2023: Since 2020, Forescout Research – Vedere Labs has been tracking the riskiest devices on organisationsโ networks. In 2020, Forescout released the firstย Enterprise of Things Security Report,ย followed in 2022 with theย Riskiest Connected Devices in Enterprise Networksย report.
Forescoutโs reports are entirely based on data coming directly from connected devices. Throughout the years, Forescout has noticed that although many device types are consistently in these lists โ such as IP cameras, VoIP equipment and programmable logic controllers (PLCs) โ due either to their inherent criticality or to the persistent lack of attention from security teams โ there are other devices whose current risk level reflects developments in the threat landscape.
For instance, in 2022 Forescout reported on hypervisors becoming a major target for ransomware โ which is a trend that only grew andย continued into 2023. However, the dataset in the 2022 report (January through April) did not include several important later developments that knocked hypervisors off the list, such as the increased targeting ofย unmanaged devices by hacktivists, growing numbers of employeesย returning to their officesย after the COVID-19 pandemic andย intensified attacks against Western critical infrastructureย following the Russian invasion of Ukraine.
Today, Forescout presents its findings about the riskiest devices in enterprise networks for 2023, taking a data-driven approach by analysing millions of devices in Forescoutโs Device Cloud using Forescoutโs multifactor risk scoringย methodology.
What Are The Riskiest Connected Devices in 2023?
Using the dataset and scoring methodology described above, Forescout identified the five riskiest device types in four device categories: IT, IoT, OT and IoMT, for a total of 20 device types.
IT | IoT | OT | IoMT | |
1 | Computer | Network attached storage (NAS) | Uninterruptible power supply (UPS) | Healthcare workstation |
2 | Server | Printer | Programmable logic controller (PLC) | Imaging |
3 | Router | IP camera | Engineering workstation | Nuclear medicine system |
4 | VPN gateway | Out-of-band management (OOBM) | Building automation | Blood glucose monitor |
5 | Security appliance | VoIP | Remote terminal unit (RTU) | Patient monitor |
Among these 20 connected device types:
- 13 were already discussed in the 2022 report and remain on the list: computers, servers and routers in IT; printers, IP cameras and VoIP in IoT; UPS, PLCs and building automation in OT; healthcare workstations, imaging devices, nuclear medicine and patient monitors in IoMT.
- Seven device types (highlighted in blue in the table) are new to the list: VPN gateways and security appliances in IT; NAS and OOBM in IoT; engineering workstations and RTUs in OT; and blood glucose monitors in IoMT
For an analysis of what makes these devices so risky and their distribution by industry (financial, government, healthcare, manufacturing and retail), read theย full report.
2023 Riskiest Connected Devices: Key Findings
- More than 4,000 vulnerabilities affect the devices in Forescoutโs dataset. Out of those, 78% affect IT devices, 14% affect IoT, 6% affect OT and 2% affect IoMT. Although most vulnerabilities affect IT devices, almost 80% of them have only high severity. In contrast, IoMT devices have fewer vulnerabilities, but 80% of them are critical, which typically allows for complete takeover of a device. Similarly, more than half of the vulnerabilities affecting OT and IoT devices are critical.
- In all industries,ย at least 10% of devices that have endpoint protection installed have it disabled. This figure is highest in government and financial services (both with almost 24%), followed closely by healthcare (21%).
- Healthcare is the riskiest industry in 2023, followed by retail and manufacturing.ย Devices in healthcare are more likely to have dangerous ports, such as Telnet, SSH and RDP open.ย Almost 10% of devices in healthcare still have Telnet ports open, compared to 3-4% of devices in other verticals.
- The highest risk reduction observed from 2022 to 2023 was in government. However,ย indicators of compromise (IOCs), such as known malicious IPs and domains, were detected most often in government (63% of IoCs), followed byย healthcare (19%) and financial services (8%).
- IT network infrastructure and security appliances are the most exposed devices on the internet. They are followed by IoT devices such as IP cameras (an overwhelming majority of IoT at 23%), NAS (7%) and VoIP (3%). There are also large numbers of exposed office equipment such as printers and NAS in government (19%) and OT in financial services (6%, mostly UPS).
- Traditional operating systems such as Windows and Linux are the majority in every industry, butย special purpose operating systems, such as embedded firmware, are particularly strong in retail (14%), healthcare (13%) and government (12%). Managing unsupported legacy versions, tracking the variety of special purpose OSes and dealing with the systematic security issues in embedded firmware are nightmares for security teams.
- Specialised devices run legacy Windows much more frequently than general-purpose IT devices. For example,ย 63%ย of OT devices and 35% of IoMT devices that run Windows are on legacy versions of the OS. This is because of their long lifespans, the legacy applications they run and the need for vendors to certify that they can be safely upgraded to newer OSes.
Beyond the Rankings: How Organisations Can Protect Their Attack Surface
Risk is not only about the likelihood of being attacked, but also considers impact factors such as business criticality. Therefore, the list of riskiest devices does not always perfectly align with the most attacked devices. Forescout expects that several of the riskiest devices identified will be among the most attacked in 2023. Especially the IT network infrastructure devices (routers, security appliances and VPN gateways) and the NAS in IoT show signs of only becoming more popular with attackers.
Some of the findings point to specific actions organisations can take to reduce immediate risk:
- Prevalence of legacy Windows and critical vulnerabilities in OT and IoMT โ Upgrade, replace or isolate these devices as much as possible.
- Often-disabled endpoint protection solutions in IT devices โ Adoptย automated device compliance verification and enforcementย to ensure that noncompliant devices cannot connect to the network.
- Commonly found exposed devices such as IP cameras and dangerous open ports such as Telnet โ Improve network security efforts, includingย segmentation.
Beyond these specific recommendations, the increased risk profiles of devices as diverse as security appliances, VPN gateways, NAS, OOBM and blood glucose monitors means that organisations need to embrace the fact that todayโsย evolving threat landscape requires new, superior security approaches to identify and reduce risk.
To bypass traditional endpoint security approaches, threat actors are consistentlyย moving to devices that offer easier initial access.ย Modernย risk and exposure managementย must encompass devices in every category toย reduce risk across the whole organisation. Solutions that work only for specific devices cannot effectively reduce risk because they are blind to other parts of the network being leveraged for an attack. For instance, OT- or IoMT-only solutions cannot assess risk for IT devices, while IT-only solutions will miss the nuances of the specialised devices.
Beyond risk assessment, risk mitigation should use automated controls that do not rely only on security agents. Likewise, they must apply to the whole enterprise instead of silos like the IT network, the OT network or specific types of IoT devices.
Ogranisations need to understand what makes the riskiest connected devices so risky. Then strive for full visibility into how many are connecting to their environment so they can secure their attack surface.
Download the Reportย here.