Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

February 21, 2026

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

February 21, 2026

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026
Facebook X (Twitter) Instagram
Saturday, February 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Industrial Control System Vulnerabilities Hit Record Highs
News

Industrial Control System Vulnerabilities Hit Record Highs

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The number of industrial control system (ICS) security advisories published in 2025 topped 500 for the first time since records began, with the severity of vulnerabilities also increasing, according to Forescout.

The security vendor revealed the findings in its new report, ICS Cybersecurity in 2026: Vulnerabilities and the Path Forward.

It said there were a total of 2155 CVEs published across 508 ICS advisories last year. That’s an increase from 103 CVEs across 67 advisories in 2011 – when records began.

The average CVSS score of advisories climbed from 6.44 in 2010 to above 8.0 in 2024 and 2025.

Read more on ICS threats: CISA Issues Advisories on Critical ICS Vulnerabilities Across Multiple Sectors.

According to the report, the most affected asset types last year, in order, were:

  • Purdue Level 1 devices: eg, field controllers, RTUs, PLCs and IEDs
  • Purdue Level 3 operation systems: eg, MES, PLM, EMS and others
  • Purdue Level 2 control systems: eg, DCS, SCADA and BMS
  • Industrial network infrastructure like routers and switches

Critical manufacturing and energy were the top two most affected industries, with transportation jumping three places from the previous year to third and healthcare moving up four places to fourth.

A CISA-Shaped Gap in Reporting

More concerning for operators of industrial and operational technology is a growing gap in threat visibility.

CISA/ICS-CERT has been “the authoritative source” about vulnerabilities in this field since the ICS Advisory (ICSA) program was started in 2010, Forescout noted. However, according to the open source ICS advisory project, a growing number of vulnerabilities don’t have an associated ICSA published by CISA.

“On January 10, 2023 CISA announced they would stop publishing updates on advisories affecting Siemens products, and instead, will be redirecting users to Siemens’ ProductCERT for the latest updates,” Forescout explained.

“This shows the need for vulnerability information beyond CISA. Yet, the situation is not restricted to Siemens and not limited to updates only.”

In fact, according to the ICS advisory project, only 22% of vulnerabilities last year had an associated ICSA published by CISA – down from 58% in 2024 and 40% in 2023.

“There were vulnerabilities without an associated ICSA published by 134 vendors in 2025. Clearly, there a fair amount of OT/ICS risk that is not tracked by ICSAs,” said the report.

“Vulnerabilities without an ICSA are no less important than those with a dedicated advisory from CISA. In fact, 61% of vulnerabilities in 2025 without an ICSA had a high or critical severity. And like those vulnerabilities tracked by CISA, these mostly affected the manufacturing and energy sectors.”

A Call to Action

The security vendor called for a combination of “regulatory pressure, industry collaboration, and vendor accountability” to address the challenges of vulnerability management in OT/ICS environments.

“Increased transparency about patch timelines, dedicated resources for vulnerability management, and stronger incentives for rapid response could help accelerate the process across the sector,” it concluded.

“Additionally, fostering a culture of proactive security, rather than reactive fixes, would benefit vendors and asset owners.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
Next Article Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Team-CWD
  • Website

Related Posts

News

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

February 21, 2026
News

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

February 21, 2026
News

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Top IRS scams to look out for in 2026

February 10, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.