The industrial control systems (ICS) landscape is facing a concerning surge in vulnerabilities, with around 34% of reported security vulnerabilities impacting ICS in the first half of 2023 lacking patches or remedies, marking a significant increase from the previous year’s 13%. Compiled data from SynSaber reveals that a total of 670 ICS product flaws were reported through the U.S. Cybersecurity and Infrastructure Security Agency (CISA) during this period.
Critical manufacturing and energy sectors stand out as the most vulnerable, while notable vendors such as Mitsubishi Electric, Siemens, and Rockwell Automation have faced substantial impacts.
SynSaber’s findings also show that Mitsubishi Electric, Siemens, and Rockwell Automation have been among the most affected vendors in the critical manufacturing sector.
Additionally, Hitachi Energy, Advantech, Delta Electronics, and Rockwell Automation have faced considerable impacts in the energy sector. Siemens emerged as the leading entity producing the most Common Vulnerabilities and Exposures (CVEs) in the first half of 2023. The report underscores that vulnerabilities, particularly “Forever-Day vulnerabilities,” remain unresolved, posing a persistent challenge.
While relying solely on CISA ICS advisories may not suffice, SynSaber emphasizes the importance of monitoring multiple information sources to gain a comprehensive understanding of relevant flaws. The report stresses that comprehending vulnerabilities within specific contexts is crucial, given the unique nature of each operational technology environment.
Meanwhile, Nozomi Networks’ revelations of high-volume network scanning indications and attack patterns, coupled with an average of 813 daily unique attacks detected against IoT honeypots, underscore the urgency of addressing and countering these evolving threats.