Likewise, firmware vulnerabilities quickly became one of the mostactive areas of security research, leading to a flood of newly discoveredvulnerabilities in all types of devices ranging from laptops to servers and networking equipment. Not only had firmware become the path of leastresistance, it was omnipresent in every enterprise device.