{"id":43803,"date":"2026-02-20T06:37:39","date_gmt":"2026-02-19T22:37:39","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/industrial-control-system-vulnerabilities-hit-record-highs-infosecurity-magazine\/"},"modified":"2026-02-20T06:37:39","modified_gmt":"2026-02-19T22:37:39","slug":"industrial-control-system-vulnerabilities-hit-record-highs-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/industrial-control-system-vulnerabilities-hit-record-highs-infosecurity-magazine\/","title":{"rendered":"Industrial Control System Vulnerabilities Hit Record Highs &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>The number of industrial control system (ICS) security advisories published in 2025&nbsp;topped 500 for the first time since records began, with the severity of vulnerabilities also increasing, according to Forescout.<\/p>\n<p>The security vendor revealed the findings in its new report, <em>ICS Cybersecurity in 2026: Vulnerabilities and the Path Forward.<\/em><\/p>\n<p>It said there were a total of 2155 CVEs published across 508 ICS advisories last year. That&rsquo;s an increase&nbsp;from 103 CVEs across 67 advisories in 2011 &ndash; when records began.<\/p>\n<p>The average CVSS score of advisories climbed from 6.44 in 2010 to above 8.0 in 2024 and 2025.<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cisa-issues-advisories-ics-vulns\/\" target=\"_blank\"><em>Read more on ICS threats: CISA Issues Advisories on Critical ICS Vulnerabilities Across Multiple Sectors.<\/em><\/a><\/p>\n<p>According to the report, the most affected asset types last year, in order, were:<\/p>\n<ul>\n<li>Purdue Level 1 devices: eg, field controllers, RTUs, PLCs and IEDs<\/li>\n<li>Purdue Level 3 operation systems: eg, MES, PLM, EMS and others<\/li>\n<li>Purdue Level 2 control systems: eg, DCS, SCADA and BMS<\/li>\n<li>Industrial network infrastructure like routers and switches<\/li>\n<\/ul>\n<p>Critical manufacturing and energy were the top two most affected industries, with transportation jumping three places from the previous year to third and healthcare moving up four places to fourth.<\/p>\n<h2><strong>A CISA-Shaped Gap in Reporting<\/strong><\/h2>\n<p>More concerning for operators of industrial and operational technology is a growing gap in threat visibility.<\/p>\n<p>CISA\/ICS-CERT has been &ldquo;the authoritative source&rdquo; about vulnerabilities in this field since the ICS Advisory (ICSA) program was started in 2010, Forescout noted. However, according to the open source ICS advisory project, a growing number of vulnerabilities don&rsquo;t have an associated ICSA published by CISA.<\/p>\n<p>&ldquo;On January 10, 2023 CISA announced they would stop publishing updates on advisories affecting Siemens products, and instead, will be redirecting users to Siemens&rsquo; ProductCERT for the latest updates,&rdquo; Forescout explained.<\/p>\n<p>&ldquo;This shows the need for vulnerability information beyond CISA. Yet, the situation is not restricted to Siemens and not limited to updates only.&rdquo;<\/p>\n<p>In fact, according to the ICS advisory project, only 22% of vulnerabilities last year had an associated ICSA published by CISA &ndash; down from 58% in 2024 and 40% in 2023.<\/p>\n<p>&ldquo;There were vulnerabilities without an associated ICSA published by 134 vendors in 2025. Clearly, there a fair amount of OT\/ICS risk that is not tracked by ICSAs,&rdquo; said the report.<\/p>\n<p>&ldquo;Vulnerabilities without an ICSA are no less important than those with a dedicated advisory from CISA. In fact, 61% of vulnerabilities in 2025 without an ICSA had a high or critical severity. And like those vulnerabilities tracked by CISA, these mostly affected the manufacturing and energy sectors.&rdquo;<\/p>\n<h2><strong>A Call to Action<\/strong><\/h2>\n<p>The security vendor called for a combination of &ldquo;regulatory pressure, industry collaboration, and vendor accountability&rdquo; to address the challenges of vulnerability management in OT\/ICS environments.<\/p>\n<p>&ldquo;Increased transparency about patch timelines, dedicated resources for vulnerability management, and stronger incentives for rapid response could help accelerate the process across the sector,&rdquo; it <a href=\"https:\/\/www.forescout.com\/blog\/ics-cybersecurity-in-2026-vulnerabilities-and-the-path-forward\/\" target=\"_blank\">concluded<\/a>.<\/p>\n<p>&ldquo;Additionally, fostering a culture of proactive security, rather than reactive fixes, would benefit vendors and asset owners.&quot;<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of industrial control system (ICS) security  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43803","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43803"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43803\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}