Security researchers find ‘staggering number’ of industrial control system vulnerabilities in 2021
- Published: Thursday, 19 August 2021 08:33
Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyber attacks on critical infrastructure and industrial enterprises have elevated ICS security to a mainstream issue according to the third Biannual ICS Risk & Vulnerability Report released by Claroty.
The report shows a 41 percent increase in ICS vulnerabilities disclosed in the first half (1H) of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.
The report provides a comprehensive analysis of ICS vulnerabilities publicly disclosed during 1H 2021, including those found by Claroty's research team, Team82, and those from trusted open sources including the National Vulnerability Database (NVD), the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), CERT@VDE, MITRE, and industrial automation vendors Schneider Electric and Siemens.
"As more enterprises are modernizing their industrial processes by connecting them to the cloud, they are also giving threat actors more ways to compromise industrial operations through ransomware and extortion attacks," said Amir Preminger, vice president of research at Claroty. "The recent cyber attacks on Colonial Pipeline, JBS Foods, and the Oldmsar, Florida water treatment facility have not only shown the fragility of critical infrastructure and manufacturing environments that are exposed to the Internet, but have also inspired more security researchers to focus their efforts on ICS specifically. This is exactly why we are committed to helping the industry at large gain a deep understanding of the risks facing industrial networks and how to mitigate them with this report."
Key findings include:
- ICS vulnerability disclosures are accelerating significantly, shining a light on the magnitude of security flaws that are just now being discovered in operational technology (OT) environments. 637 ICS vulnerabilities were disclosed in 1H 2021, a 41 percent increase from the 449 vulnerabilities disclosed in 2H 2020. 81 percent of those were discovered by sources external to the affected vendor, including third-party companies, independent researchers, academics, and other research groups. Additionally, 42 new researchers reported vulnerabilities.
- 71 percent of the vulnerabilities are classified as high or critical, reflecting the high severity and impactful nature of the exposures and their potential risk to operations.
- 90 percent have low attack complexity, meaning they do not require special conditions and an attacker can expect repeatable success every time.
- 74 percent do not require privileges, meaning the attacker is unauthorized and does not require any access to settings or files, and 66 percent do not require user interaction, such as opening an email, clicking on links or attachments, or sharing sensitive personal or financial information.
- 61 percent are remotely exploitable, demonstrating the importance of securing remote connections and Internet of Things (IoT) and Industrial IoT (IIoT) devices.
- 65 percent may cause total loss of availability, resulting in denial of access to resources.
- 26 percent have either no available fix or only a partial remediation, highlighting one of the key challenges of securing OT environments compared to IT environments.
- The top mitigation steps noted in ICS-CERT alerts and vendor advisories include network segmentation (applies to 59 percent of vulnerabilities), secure remote access (53 percent), and ransomware, phishing, and spam protection (33 percent).