833-847-3280
Schedule a Call

Securing the Unpatchable in Your Network

A man is sitting in front of an unpatchable printer with "hacked" being printed out, and on the computer screen.

The recent disclosure of a critical vulnerability affecting millions of Brother printers, one that cannot be patched, has sparked serious concern among IT and security professionals. It’s a stark reminder that not every security flaw can be resolved through a software update or firmware fix.

For organizations relying on legacy or embedded systems, unpatchable vulnerabilities are not a theoretical concern. They are a persistent reality.

So, what do you do when you can’t patch? The answer lies in a multi-layered approach that combines technical, procedural, and strategic controls to contain and mitigate the risk.

 

Know What You’re Dealing With: Asset Inventory and Risk Profiling

The first step is understanding exactly what you’re dealing with. Organizations must have a clear, up-to-date inventory of all devices on the network, including peripherals like printers, scanners, and network-connected IoT devices. Too often, these devices fall through the cracks of traditional IT asset management, creating blind spots for security teams.

Once identified, each device should be assessed for its function, exposure, and risk profile. Devices that connect to sensitive systems or handle confidential data demand greater scrutiny than those with limited access.

 

Containment Through Segmentation

Once the vulnerable devices are identified, the next priority is to implement network segmentation. By isolating these endpoints from the broader network, typically by assigning them to a dedicated VLAN or subnet, organizations can dramatically reduce the risk of lateral movement should a compromise occur.

Communications to and from the device should be tightly controlled through firewalls and access control lists. Only the necessary protocols and ports should be open, and only to explicitly defined endpoints such as a print server or a few authorized clients.

 

Strengthen Devices with Compensating Controls

Even with isolation, compensating controls must be put in place. Many modern printers and embedded devices offer basic security features that are often disabled by default. Enabling authentication for users who wish to print, enforcing secure release mechanisms that require user presence, and disabling unnecessary services or ports can all reduce the attack surface.

For sensitive environments, restricting printing functionality entirely to virtual machines or print servers that serve as choke points can be an effective approach.

 

Monitor Like It Matters

Monitoring becomes especially critical when vulnerabilities cannot be patched. Print devices should not be treated as second-class citizens when it comes to logging and visibility. Network and device-level logs should be forwarded to a centralized SIEM, where anomalous behavior, such as unusually high volumes of print jobs, unexpected restarts, or communication with unfamiliar IP addresses, can trigger alerts and investigations.

These logs also serve as an invaluable resource during incident response, helping to identify the scope and origin of any compromise.

 

Operational Security: Physical and Administrative Safeguards

Operational controls also play a crucial role. Physical access to these devices should be strictly limited, particularly in public or semi-public areas where tampering is a potential concern.

Administrators should also routinely purge stored documents, cached credentials, and other sensitive data from these devices.

Firmware should be kept up to date, even if a patch for the vulnerability in question is not available, as other improvements may close related security gaps.

 

When to Retire: Strategic Risk Management

At a strategic level, organizations must face the question of risk tolerance. In many cases, the best long-term response to an unpatchable vulnerability is to retire and replace the affected device. This is especially true for devices no longer supported by the manufacturer, which are unlikely to receive any future security updates. While budget and operational constraints may limit immediate action, a phased replacement plan tied to lifecycle management can prevent future exposure.

 

Build Awareness: Train Your People

Lastly, communication and training are vital. Users must understand that peripherals, such as printers, are not immune to attack and should be treated as part of the broader security ecosystem. Policies around device usage, data handling, and reporting unusual activity must be reinforced regularly.

 

Final Thoughts: A Layered Defense is the Best Patch

Unpatchable vulnerabilities are not the end of the world, but they are a wake-up call. They challenge us to think beyond patches and adopt a more holistic security model, one that combines visibility, control, and risk-based decision-making. In the face of threats that can’t be fixed with a single update, our best defense is layered, deliberate, and proactive.

 

Take Control Before the Threat Takes Over

Unpatchable doesn’t mean unmanageable, but it does demand a proactive approach. If your organization is struggling with legacy systems, embedded devices, or other unpatchable vulnerabilities, now is the time to act. At MainNerve, we help organizations build resilient, layered defenses tailored to their risk landscape. From network segmentation to custom penetration testing and security strategy, we’ll help you secure what can’t be patched. Contact us today for a free consultation and take the first step toward a stronger, smarter defense.

Latest Posts

A transparent image used for creating empty spaces in columns
 When Hertz suffered a data breach through its managed file transfer system, the headlines focused on the technical details: two zero-day vulnerabilities, remote code execution, and stolen data. We’re not here to blame Hertz; no company is immune to cyberattacks, and zero-days by nature…
A transparent image used for creating empty spaces in columns
Small and mid-sized businesses (SMBs) face a unique security challenge: they have valuable data and operations to protect, but far fewer resources than large enterprises. Every dollar spent on cybersecurity must deliver maximum value, especially for something as specialized (and potentially expensive) as penetration testing.…
A transparent image used for creating empty spaces in columns
 In politics, “trust but verify” became famous as a reminder that even friendly relationships need fact-checking. In cybersecurity, it’s more than a catchy phrase; it’s a survival skill. For security leaders, especially in small to mid-sized businesses, it’s easy to feel confident when you’ve…
A transparent image used for creating empty spaces in columns
In today’s cybersecurity world, security operations teams are surrounded by more tools, dashboards, and alerts than ever before. SIEMs collect and analyze data from across the entire network, endpoint tools monitor user behavior and system changes, and automated alerts run continuously around the clock. But…
A transparent image used for creating empty spaces in columns
Client: Mid-Sized Municipal Government Service: Internal Network Penetration Test Objective: Evaluate the effectiveness of internal network segmentation, with a focus on isolating high-sensitivity environments.   Executive Summary A mid-sized municipality brought us in to take a closer look at their internal network security. Their main…
A transparent image used for creating empty spaces in columns
 In today’s fast-evolving cybersecurity landscape, organizations face an ever-growing list of threats: ransomware, phishing, zero-days, supply chain attacks, and more. To defend against these dangers, one of the foundational steps is conducting a vulnerability assessment. But many people confuse this critical process with simply…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
On Load
Where? .serviceMM
What? Mega Menu: Services