Skip to main content
Mallory
Mallory

Risks from Legacy and Unpatched Systems in Critical Infrastructure

critical infrastructurevulnerabilitiesrisksunpatchedexploitspatch managementcyberattacksoperational riskaging systemsrisk frameworkoutdated technologybreachesfirewallsnetwork edgesattackers
Updated November 27, 2025 at 07:00 AM2 sources

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

A new Cisco report highlights the growing risk posed by legacy and unsupported systems within national critical infrastructure, revealing that nearly half of global business network assets were already aging or obsolete as of 2020. The United Kingdom, in particular, faces significant exposure, with 228 legacy systems identified across government in 2024 and over a quarter at high risk of operational or security failure. The report underscores that unsupported systems, often located at network edges, are prime targets for attackers, and that a majority of breaches in the EU during 2022 and 2023 exploited vulnerabilities with available but unapplied patches. Healthcare and other essential sectors are especially vulnerable due to concentrated use of outdated technology.

Recent cyberattacks have increasingly targeted legacy firewalls and network devices, with state-sponsored groups exploiting known vulnerabilities in products from vendors such as Cisco, SonicWall, Palo Alto Networks, and Fortinet. Research indicates that 60% of enterprise firewalls fail high-severity compliance checks, reflecting deeper governance and patch management issues. Attackers are leveraging these weaknesses, often chaining exploits across network edges and VPNs, while defenders struggle with fragmented vendor alerts and outdated risk frameworks. The persistent use of unsupported technology and delayed patching continues to undermine national resilience and exposes critical infrastructure to significant cyber threats.

Sources

November 27, 2025 at 12:00 AM

Related Stories

Enterprise and Critical Infrastructure Threats from Unpatched and Unmanaged Devices

Recent research highlights that enterprise networks are increasingly vulnerable due to a high prevalence of legacy, end-of-life (EOL) systems, unpatched devices, and poor network segmentation. Telemetry from over 27 million devices across 1,800 enterprises reveals that 26% of Linux and 8% of Windows systems are running unsupported operating systems, with 39% of IT devices lacking active endpoint security. Additionally, a significant portion of devices operate outside IT control, and 77% of corporate networks are poorly segmented, allowing low-security devices to share network space with high-value assets, increasing the risk of lateral movement by attackers. Simultaneously, critical infrastructure sectors such as energy, healthcare, government, and transportation are experiencing a surge in cyberattacks targeting IoT and Android devices. Attackers are exploiting the interconnectedness of these industries for financial gain, with the U.S. being the primary target. The rise in attacks underscores the need for stringent tracking of user behaviors, robust access controls, accurate asset inventories, and improved network segmentation to mitigate risks posed by unmanaged and vulnerable devices in both enterprise and critical infrastructure environments.

4 months ago

Modern Strategies for Managing Legacy and Unmanageable Systems in Cybersecurity

Organizations are increasingly challenged by the risks posed by legacy systems, unmanageable devices, and unknown assets within their networks. Security leaders and experts emphasize the importance of comprehensive asset discovery and visibility as foundational steps to effective vulnerability management. Automated solutions that map infrastructure, including unauthenticated and legacy devices, are critical for identifying blind spots and prioritizing risk. Experts caution against over-reliance on traditional CVE-based tools, highlighting that many real-world breaches exploit default credentials, poor configurations, and unmanaged assets that may not appear in standard vulnerability reports. Rapid response capabilities, such as real-time intelligence and query-based searches, are recommended to quickly identify and mitigate zero-day exposures. In sectors like healthcare, the long lifecycle of medical devices presents unique challenges, as many systems cannot be patched or easily replaced. Security leaders advocate for network segmentation and close collaboration with vendors to manage these risks, while also promoting proactive, risk-based approaches that go beyond compliance checklists. Commentary from industry professionals underscores that legacy and unmanageable systems are often targeted by advanced persistent threats and botnets, with attackers leveraging automation and AI to exploit exposures. Addressing these challenges requires breaking down silos between IT, OT, and security teams, and adopting strategies that prioritize visibility, risk reduction, and continuous improvement across all assets.

4 months ago

Cisco Initiative to Address Security Risks in Aging Network Infrastructure

Cisco has announced a new initiative, "Resilient Infrastructure," aimed at mitigating the security risks posed by aging and unsupported network equipment, including routers and switches. The company is responding to the growing threat landscape, where generative AI is making it easier for attackers to exploit vulnerabilities in legacy devices, many of which are no longer supported with security patches or updates. Cisco's effort includes research, industry outreach, and technical changes to how it manages its own legacy products, with a focus on both its own and other vendors' equipment still in use. As part of this initiative, Cisco will begin issuing explicit warnings to customers when their devices are approaching end-of-life or are configured insecurely. Over time, the company plans to disable insecure options by default and eventually remove them entirely from its products. This move comes after analyses revealed that Chinese nation-state actors have exploited known vulnerabilities in Cisco equipment during high-profile attacks on telecom providers. Cisco's approach aims to make secure configurations the default and to proactively alert administrators to risky settings, thereby reducing the attack surface presented by outdated infrastructure.

3 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.