ICS Vulnerability Disclosures Rise 41%
August 20, 2021
control system (ICS) vulnerability disclosures are drastically
increasing as high-profile cyber attacks on critical
infrastructure and industrial enterprises have elevated ICS
security to a mainstream issue, according to the third Biannual
ICS Risk & Vulnerability Report released today by Claroty, the
industrial cybersecurity company. The report shows a 41%
increase in ICS vulnerabilities disclosed in the first half (1H)
of 2021 compared to the previous six months, which is
particularly significant given that in all of 2020 they
increased by 25% from 2019 and 33% from 2018.
71% of the vulnerabilities are classified as high or critical, reflecting the high severity and impactful nature of the exposures and their potential risk to operations.
90% have low attack complexity, meaning they do not require special conditions and an attacker can expect repeatable success every time.
74% do not require privileges, meaning the attacker is unauthorized and does not require any access to settings or files, and 66% do not require user interaction, such as opening an email, clicking on links or attachments, or sharing sensitive personal or financial information.
61% are remotely exploitable, demonstrating the importance of securing remote connections and Internet of Things (IoT) and Industrial IoT (IIoT) devices.
26% have either no available fix or only a partial remediation, highlighting one of the key challenges of securing OT environments compared to IT environments.
The top mitigation steps noted in ICS-CERT alerts and vendor advisories include network segmentation (applies to 59% of vulnerabilities), secure remote access (53%), and ransomware, phishing, and spam protection (33%).
Claroty’s Team82 remains the market leader in ICS vulnerability research, having disclosed 70 vulnerabilities in 1H 2021 and over 150 vulnerabilities to date, all of which can be found in the Team82 Vulnerability Dashboard.