XIoT Report: over 50 percent more IoT vulnerabilities

XIoT Report: over 50 percent more IoT vulnerabilities

Share post

Team1's State of XIoT Security Report: 2022H 82 shows an increase in IoT vulnerabilities, vendor self-identified vulnerabilities, and fully or partially fixed firmware vulnerabilities. On average, 125 XIoT vulnerabilities are published and fixed per month.

Disclosures of vulnerabilities in IoT devices increased by 2022 percent in the first half of 57 compared to the previous six months. This is shown by the new State of XIoT Security Report: 1H 2022 from Claroty, the specialist for the security of cyber-physical systems (CPS). In the same period, the security gaps disclosed by manufacturers themselves have increased by 69 percent and have thus exceeded the number of reports from independent security researchers for the first time. Fully or partially patched firmware vulnerabilities have increased by 79 percent, a notable improvement given the challenges of patching firmware versus software vulnerabilities.

OT and ICS areas are also affected

🔎 State of XIoT Security 1H 2022 Part 1 (Image: Claroty).

Prepared by Claroty's award-winning research team, Team82, the report provides a comprehensive analysis of published vulnerabilities in the enhanced Internet of Things (XIoT), the network of cyber-physical systems that powers operational technology (OT) and industrial control systems (ICS), the Internet of Medical Things (IoMT), building management systems and enterprise IoT. The report includes vulnerabilities discovered by Team82 as well as those that come from trusted open sources. These include the National Vulnerability Database (NVD), the Industrial Control Systems Cyber ​​Emergency Response Team (ICS-CERT), CERT@VDE, MITER and the industrial automation providers Schneider Electric and Siemens.

Other key results

  • IoT devices: 15 percent of the vulnerabilities were found in IoT devices. This is a significant increase from 9 percent in Team82's last report for the second half of 2021. Additionally, the combination of IoT and IoMT vulnerabilities (18,2%) outperformed IT vulnerabilities (16,5%) for the first time . This illustrates the increased awareness among manufacturers and security researchers of the security of these connected devices, which can serve as gateways into the networks.
  • Vulnerabilities disclosed by manufacturers themselves: For the first time, disclosures from manufacturers (29%) have surpassed reports from independent researchers (19%), ranking second behind security companies (45%). With 214 published CVEs, the number of reported vulnerabilities has almost doubled compared to the last half year (127). This indicates that more OT, IoT and IoMT vendors are setting up vulnerability disclosure programs and devoting more resources to testing the security of their products than ever before.
  • Firmware: Published firmware vulnerabilities were almost par with software vulnerabilities (46% and 48%, respectively). This is a huge increase from the report for the second half of 2021, when the ratio between software (62%) and firmware (37%) was almost 2:1. The report also shows a significant increase in fully or partially fixed firmware vulnerabilities (40% in H2022 21 vs. 2021% in HXNUMX XNUMX), which is notable given the challenges of patching firmware due to longer update cycles and infrequent maintenance windows. This is likely due to a growing interest among researchers in securing devices at the lower levels of the Purdue model, which are more directly connected to the actual process and thus represent a more attractive target for attackers.

    🔎 State of XIoT Security 1H 2022 Part 2 (Image: Claroty).

  • Scope and criticality: On average, 125 XIoT vulnerabilities are published and fixed per month, for a total of 2022 vulnerabilities disclosed in the first half of 747. The vast majority are classified as high (46%) or critical (19%) according to their CVSS score.
  • Effects: Almost three quarters (71%) of vulnerabilities have a high impact on system and device availability. The most common potential impact is unauthorized remote code or command execution (accounting for 54% of vulnerabilities), followed by denial of service conditions (crash, exit, or reboot) at 43%.
  • Remedial Actions: The most common remediation measure is network segmentation (recommended for 45% of vulnerability reports), followed by secure remote access (38%) and protection against ransomware, phishing and spam (15%).
  • Team82: Team82 continues to be at the forefront of OT vulnerability research, uncovering 2022 vulnerabilities in the first half of 44 for a total of 335 vulnerabilities to date.

The full findings, in-depth analysis, and additional measures to protect against unauthorized access and risks can be found in Claroty's semi-annual State of XIoT Security Report: 1H 2022.

More at Claroty.com

 


About Claroty

Claroty, the Industrial Cybersecurity Company, helps its global customers discover, protect and manage their OT, IoT and IIoT assets. The company's comprehensive platform can be seamlessly integrated into customers' existing infrastructure and processes and offers a wide range of industrial cybersecurity controls for transparency, threat detection, risk and vulnerability management and secure remote access - with significantly reduced total cost of ownership.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Vulnerabilities in medical devices

One in four medical devices (23%) has a vulnerability from the US cyber security agency CISA's Known Exploited Vulnerabilities (KEV) catalog. In addition, there are ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more