ICS security

Industrial control system vulnerabilities up 25 percent in 2020

February 5, 2021
  • 71.5 percent of the vulnerabilities are exploited through a network attack vector (i.e. remotely exploitable).
  • 90 percent don’t require special conditions to exploit, and an attacker can expect repeatable success every time.
  • In 76.4 percent of the cases, the attackers are unauthenticated prior to attack and don’t require any access or privileges to the target’s settings or files.
  • If exploited successfully, 66 percent of the vulnerabilities can cause total loss of availability.
prestitial ad