Critical infrastructure vulnerabilities increased by 41% in first half of 2021
Vulnerability reports are growing in severity too
There has been a 41% increase in disclosed flaws within industrial control systems in the first half of 2021 compared to the previous six months, according to a new report from cyber security firm Claroty.
Claroty found this particularly significant given they increased by just 25% in 2020 relative to 2019 and 33% compared to 2018.
The research said that 637 ICS vulnerabilities were disclosed in the first half of 2021, a 41% increase from the 449 vulnerabilities disclosed in the second half of 2020. Of those vulnerabilities, 81% were discovered by sources other than the affected vendor, such as third-party companies, independent researchers, academics, and other research groups.
Of those vulnerabilities, 71% were classified as high or critical and 90% had a low attack complexity, meaning they required no special conditions and a hacker could easily repeat them.
The report also found that 74% of the vulnerabilities did not require privileges. This means an unauthorized hacker could easily access settings or files. Sixty-six percent of the vulnerabilities did not require user interaction, such as opening an email, clicking on links or attachments, or sharing sensitive personal or financial information.
Of the vulnerabilities, 61% are remotely exploitable, demonstrating the importance of securing remote connections and internet of things (IoT) and industrial IoT (IIoT) devices, the report said.
RELATED RESOURCE
X-Force Threat Intelligence Index
Top security threats and recommendations for resilience
The report said more researchers than ever are looking for flaws in ICS products and OT protocols: 42 new researchers disclosed vulnerabilities in the first half of 2021, and 20 vendors had vulnerabilities disclosed publicly for the first time.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Siemens was the affected vendor with the most reported vulnerabilities at 146, many of which were disclosed as part of internal research conducted by the Siemens CERT.
"As more enterprises are modernizing their industrial processes by connecting them to the cloud, they are also giving threat actors more ways to compromise industrial operations through ransomware and extortion attacks," said Amir Preminger, vice president of research at Claroty.
"The recent cyber attacks on Colonial Pipeline, JBS Foods, and the Oldmsar, Florida water treatment facility have not only shown the fragility of critical infrastructure and manufacturing environments that are exposed to the internet but have also inspired more security researchers to focus their efforts on ICS specifically. This is exactly why we are committed to helping the industry at large gain a deep understanding of the risks facing industrial networks and how to mitigate them with this report."
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Building enduring channel partnerships in a multi-generational IT environmentIndustry Insights Partners are evolving from sellers to strategic advisors, prioritizing customer outcomes
-
What can AI do to empower those working in the legal sector today, tomorrow, and beyond?Supported AI is transforming the legal profession — from streamlining today’s workflows to shaping tomorrow’s strategies. For firms, the choice is clear: embrace trusted AI tools now or risk falling behind in a rapidly evolving landscape
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
-
Hackers are targeting Ivanti VPN users again – here’s what you need to knowNews Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
-
Broadcom issues urgent alert over three VMware zero-daysNews The firm says it has information to suggest all three are being exploited in the wild
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claimNews Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
-
Everything you need to know about the Microsoft Power Pages vulnerabilityNews A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
-
Vulnerability management complexity is leaving enterprises at serious riskNews Fragmented data and siloed processes mean remediation is taking too long
