The Riskiest Devices of 2025

This year, a dozen brand-new asset types have made the list. It is the single largest year-over-year change observed in the report’s history. We analyzed industry, country, and device data taken directly from Forescout’s Device Cloud — one of the largest global repositories of IT, OT, IoT, and IoMT data in existence.

Watch the WebinarGet the Report

 

12

New riskiest asset types

33%

YoY increase in risk for top 10 countries

19M

Devices analyzed

2500+

Operating system versions

Get a Deeper Understanding of Today’s Device Risk

Keeping up with all the risk lurking in your network isn’t easy. Join this webinar led by Daniel dos Santos, Head of Research, as he dives into all the device risk — including the 12 new asset types appearing on this year’s list across IT, OT, IoT, and IoMT.

Riskiest Device Categories

Device types highlighted in blue were not present in the 2023 Riskiest Devices report.

IT IoT OT IoMT
1 Application Delivery Controller (ADC) Network Video Recorder (NVR) Universal Gateway Imaging Devices
2 Intelligent Platform Management Interface (IPMI) Network Attached Storage (NAS) Historian Lab Equipment
3 Firewall VoIP Systems Building Management System (BMS) Healthcare Workstations
4 Domain Controller IP Camera Physical Access Control Systems Infusion Pump Controller
5 Router Point of Sale (PoS) Systems Uninterruptible Power Supply (UPS) Picture Archiving and Communication System (PACS)
get the report

Exploitable: Most Vulnerable Devices with Critical Vulnerabilities

Computers have the highest number of vulnerabilities overall but not the most dangerous ones. Routers surpass computers — accounting for half of the most critical vulnerabilities.

IoMT devices – pump controllers, medication dispensing systems and workstations – have some of the most dangerous vulnerabilities – and highlight healthcare security risks.

Most Vulnerable Device Categories in Total

Five of the top 10 device types also appear among the riskiest devices. Vulnerabilities are a major risk factor for connected devices. The distinction between total vulnerabilities and highly exploitable ones reinforces why network infrastructure and medical devices are prime attack targets.

Open Ports by Industry

Here’s a concerning trend: The use of SSH – which is encrypted – declined across all industries but the use of Telnet – which is not encrypted – increased in every industry. SMB remains the most widely used protocol across all industries.

Risk by Industry

These five industries have the largest number of connected devices. The gap in risk scores between industries has narrowed — with an overall average risk score of 8.98. This marks a significant 15% increase from 2024’s average of 7.73

Countries with Highest Average Device Risk

We selected the 11 countries where the average device risk was 9 or higher. The average risk per country has increased significantly this year. In 2024, the average risk for the top 10 countries was 6.53. In 2025, it has risen to 9.1 — a 33% increase.

The top three countries with the highest risk are Spain, China, and the UK.

Risk Scoring Methodology

To measure risk, we use a multifactor risk-scoring methodology calculated based on three factors: Configuration, behavior and function.
  • Configuration is the number and severity of vulnerabilities on a device, plus the quantity and criticality of open ports.
  • Behavior tracks inbound and outbound malicious traffic to devices and inbound internet traffic towards the devices
  • Function is the potential impact to the organization if a device is compromised.

Each device is assigned a risk score between one and 10. After measuring the risk of each individual device, we calculate averages per type of device to understand which types are the riskiest.

See the Research, Share the Presentation

Vedere Labs shares an overview of the research in a presentation format for you and your security team to use and share. Get a rundown of today’s asset risk across 20 device types in IT, OT, IoT, and IoMT.

How Forescout Can Help

Introducing the Forescout 4D Platform™

Manage risks. Contain events. Mitigate threats.

The Forescout 4D Platform™ continuously identifies, protects and ensures the compliance of all managed and unmanaged cyber assets – IT, IoT, IoMT and OT – without business disruption.

  • Risk and exposure management. Identify, quantify and prioritize cybersecurity risk. Start by discovering and assessing every connected asset to gain real-time awareness of your attack surface.
  • Network security. Continuously monitor all connected assets to govern network access, using real-time traffic visibility to manage segmentation and dynamic control policies to mitigate and remediate risk.
  • Threat detection and response. Detect, investigate and respond to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.
Demo RequestForescout PlatformTop of Page