New Features in May 2025
Focus
Focus
Device Security

New Features in May 2025

Table of Contents

New Features in May 2025

Review the new features introduced in Device Security in May 2025.
Where Can I Use This?What Do I Need?
  • (Legacy) IoT Security (Standalone portal)
One of the following subscriptions:
  • Device Security subscription for an advanced Device Security product (Enterprise, OT, or Medical)
  • Device Security X subscription
The following new features and enhancements were introduced for Device Security in May 2025.
New Features
New Polling Plugin Support
The Device Security Network Discovery plugin polling now supports the following protocols for polling:
  • Axis Communications
  • Cognex Discovery
  • EPM
  • FTP Banner
  • Moxa
  • Niagara Fox
  • Reverse DNS
Vulnerability signatures
The Device Security Research team added detections for 435 vulnerabilities this month. Of the 435 vulnerabilities, 29 of them had a critical CVSS score. You can see a complete list of the CVEs for which detections have been added at Vulnerability Signatures in 2025.
Dictionary file update
There were five dictionary file updates in May 2025. The following summarizes what was added in each update:
  • April 30 update – 17 new profiles and 2 new vendors
  • May 07 update – 9 new profiles, 46 new vendors, and 57 new models
  • May 14 update – 37 new profiles, 13 new vendors, and 35 new models
  • May 21 update – 11 new profiles and 5 new vendors
  • May 28 update – 14 new profiles, 20 new vendors, and 48 new models

Risk Factor for VLAN Security Zone Bridge

Devices that connect simultaneously to multiple security zones pose significant security risks by potentially allowing traffic to bypass established firewall policies. Device Security flags these risks by detecting devices with network interfaces that span multiple NGFW security zones, helping you to identify and remediate these compliance breaches. When Device Security discovers a device with interfaces connected to VLANs belonging to different security zones, such as trusted and untrusted, it automatically generates a risk factor, increasing that device's overall risk score. This new risk factor gives you visibility into potentially dangerous network configurations that could allow lateral movement between isolated network segments.
You can find all devices acting as security zone bridges by filtering in the asset inventory, helping you to investigate why these assets have been configured in this way. The feature provides detailed information about which interfaces are connected to which security zone in the device details interface list. Use this context to understand the severity of each case and prioritize remediation efforts. Once you resolve the issue by reconfiguring the device's network connections to reside within the same security zone, the system automatically removes the risk factor and updates the device's risk score, reflecting the improved security posture.
This feature enhances your network security by ensuring that security zone boundaries remain intact. It leverages existing subnet-to-security zone mapping capabilities to detect these violations accurately and provides a path to identification and remediation. By using this feature, you gain deeper insight into potential security policy violations in your network architecture and can maintain stronger segmentation between different security zones.