Claroty’s Biannual ICS Risk & Vulnerability Report revealed a 25% increase in ICS vulnerabilities disclosed compared to 2019, as well as a 33% increase from 1H 2020. The report noted that throughout 2H 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors.
During 2H 2020, 449 vulnerabilities affecting ICS products from 59 vendors were disclosed. Of those, 70% were assigned high or critical Common Vulnerability Scoring System (CVSS) scores, and 76% do not require authentication for exploitation.
“The accelerated convergence of IT and OT networks due to digital transformation enhances the efficiency of ICS processes, but also increases the attack surface available to adversaries,” said Amir Preminger, vice president of research at Claroty.
He opined that nation-state actors are clearly looking at many aspects of the network perimeter to exploit, and cybercriminals are also focusing specifically on ICS processes, which emphasizes the need for security technologies such as network-based detection and secure remote access in industrial environments.
“It is heartening to see a growing interest in ICS within the security research community, as we must shine a brighter light on these vulnerabilities in order to keep threats at arm’s length,” added Preminger.
Rising threats to critical sectors
The critical manufacturing, energy, water and wastewater, and commercial facilities sectors—all designated as critical infrastructure sectors—were by far the most impacted by vulnerabilities disclosed during 2H 2020 and shows increases from the previous two years across the board:
● Critical manufacturing increased 15% from 2H 2019 and 66% from 2H 2018
● Energy increased 8% from 2H 2019 and 74% from 2H 2018
● Water and wastewater increased 54% from 2H 2019 and 63% from 2H 2018
● Commercial facilities increased 14% from 2H 2019 and 140% from 2H 2018
What’s driving rise in ICS vulnerabilities
The number of ICS vulnerabilities disclosed in 2020 increased by more than 30% compared to 2018 and nearly 25% compared to 2019.
Two factors contribute to this spike in recent years: a heightened awareness of the risks posed by ICS vulnerabilities, and researchers and vendors increasingly focused on identifying and remediating security flaws as effectively and efficiently as possible. This growth indicates security research focused on ICS products maturing.
Third-party researchers were responsible for 61% of discoveries, many of which were cybersecurity companies. This signals a change in focus to include ICS alongside IT security research, further evidence of the accelerated convergence between IT and OT. Among all third-party discoveries, 22 reported their first disclosures, a positive sign of growth in the ICS vulnerability research market.