Skip to main content
Mallory
Mallory

Enterprise and Critical Infrastructure Threats from Unpatched and Unmanaged Devices

critical infrastructureIoTcorporate networksunpatchedunmanagedexploitvulnerabilityrisk mitigationEOLLinuxaccess controlsWindowstelemetryAndroidendpoint
Updated November 13, 2025 at 06:11 PM3 sources

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Recent research highlights that enterprise networks are increasingly vulnerable due to a high prevalence of legacy, end-of-life (EOL) systems, unpatched devices, and poor network segmentation. Telemetry from over 27 million devices across 1,800 enterprises reveals that 26% of Linux and 8% of Windows systems are running unsupported operating systems, with 39% of IT devices lacking active endpoint security. Additionally, a significant portion of devices operate outside IT control, and 77% of corporate networks are poorly segmented, allowing low-security devices to share network space with high-value assets, increasing the risk of lateral movement by attackers.

Simultaneously, critical infrastructure sectors such as energy, healthcare, government, and transportation are experiencing a surge in cyberattacks targeting IoT and Android devices. Attackers are exploiting the interconnectedness of these industries for financial gain, with the U.S. being the primary target. The rise in attacks underscores the need for stringent tracking of user behaviors, robust access controls, accurate asset inventories, and improved network segmentation to mitigate risks posed by unmanaged and vulnerable devices in both enterprise and critical infrastructure environments.

Related Stories

Enterprise Risk from Unmanaged and Diverse xIoT and OT Devices

Enterprises are increasingly exposed to cybersecurity risks due to the proliferation of unmanaged and diverse extended Internet of Things (xIoT) and operational technology (OT) devices within their networks. Research analyzing over 10 million devices across 700 organizations found that two-thirds of networked devices are not traditional IT assets, but rather include network gear, OT, IoT, and medical equipment. Common high-risk device types such as VoIP phones, IP cameras, point-of-sale systems, and uninterruptible power supplies are often widespread yet remain unmanaged, creating significant security blind spots. The diversity of device functions, vendors, and operating system versions further complicates risk management, making it challenging for security teams to identify, patch, and mitigate vulnerabilities effectively. Manufacturers, in particular, face heightened OT security challenges due to legacy technology, lack of asset visibility, and the growing number of access points resulting from mergers and acquisitions. The complexity of managing access permissions, especially with multiple users sharing admin accounts, increases the difficulty of incident response and overall security posture. Despite increased awareness of these risks, the combination of device diversity, legacy systems, and human factors continues to present substantial obstacles to securing enterprise and manufacturing environments against cyber threats.

4 months ago

Risks from Legacy and Unpatched Systems in Critical Infrastructure

A new Cisco report highlights the growing risk posed by legacy and unsupported systems within national critical infrastructure, revealing that nearly half of global business network assets were already aging or obsolete as of 2020. The United Kingdom, in particular, faces significant exposure, with 228 legacy systems identified across government in 2024 and over a quarter at high risk of operational or security failure. The report underscores that unsupported systems, often located at network edges, are prime targets for attackers, and that a majority of breaches in the EU during 2022 and 2023 exploited vulnerabilities with available but unapplied patches. Healthcare and other essential sectors are especially vulnerable due to concentrated use of outdated technology. Recent cyberattacks have increasingly targeted legacy firewalls and network devices, with state-sponsored groups exploiting known vulnerabilities in products from vendors such as Cisco, SonicWall, Palo Alto Networks, and Fortinet. Research indicates that 60% of enterprise firewalls fail high-severity compliance checks, reflecting deeper governance and patch management issues. Attackers are leveraging these weaknesses, often chaining exploits across network edges and VPNs, while defenders struggle with fragmented vendor alerts and outdated risk frameworks. The persistent use of unsupported technology and delayed patching continues to undermine national resilience and exposes critical infrastructure to significant cyber threats.

3 months ago

Enterprise Risks from Insecure Third-Party IoT Devices and Botnets

Organizations face significant cybersecurity risks from the proliferation of insecure third-party Internet of Things (IoT) devices, which often lack robust security controls and are increasingly targeted by cybercriminals. The BADBOX 2.0 botnet exemplifies this threat, having infected over a million low-cost Android-based IoT devices such as smart TVs, many of which are shipped with preinstalled malware or compromised through malicious applications. These infected devices are then leveraged to create large-scale residential proxy networks, enabling cybercriminals to conduct ad fraud, credential stuffing, and other illicit activities while masking their true origins. The FBI has warned that compromised IoT devices are being abused at scale, including on home and small office networks used for work, making them a significant liability for enterprises when connected to corporate environments. The rapid growth of IoT adoption—currently estimated at over 17 billion connected devices worldwide—has expanded the attack surface for organizations, introducing challenges such as limited device resources, inconsistent security measures, and the need for strong authentication and encryption. Security experts recommend that organizations implement rigorous procurement controls, demand verifiable updates and transparent software bills of materials from vendors, and develop comprehensive IoT security strategies that include proactive threat detection and end-to-end security frameworks. Robust IoT software testing and policy development are essential to mitigate these risks and ensure the secure operation of IoT devices within enterprise networks.

4 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.