EmberOT and ICS[AP] release joint OT Vulnerability Intelligence Report, giving industrial defenders a context-driven framework to cut through the noise of a record-breaking year of disclosures
February 26, 2026 /EINPresswire/ EmberOT, and The ICS Advisory Project today released the ICS/OT Vulnerability Intelligence Report 2024-2025, a comprehensive analysis of industrial control system vulnerabilities that challenges the conventional wisdom of score-based patch prioritization. The report’s most striking finding: of 2,203 vulnerabilities scored High or Critical in 2024 and 2025, only 29, 1.32%, have ever been confirmed as weaponized in the real world.
The report arrives at a pivotal moment. CISA (the Cybersecurity & Infrastructure Security Agency) published 508 ICS advisories in 2025 alone – a 20% increase over the previous year, while total tracked disclosures across all sources rose to 2,207. At the same time, the share of vulnerabilities receiving an official CISA advisory dropped from 28.3% in 2024 to just 17.5% in 2025, leaving the vast majority of disclosures invisible to organizations relying solely on federal feeds.
Key Finding: 98.4% of vulnerabilities scored High or Critical in 2024-2025 have never been confirmed as exploited in the wild, yet they continue to consume the majority of OT security teams’ bandwidth.
“OT defenders are protecting more than just data… They’re protecting process, safety, and business continuity,” states Jori VanAntwerp, Founder of EmberOT.” A scoring system designed for IT environments was never built to answer the question that matters most in OT: which vulnerabilities, in my specific architecture, matter right now? This report gives teams the framework to answer that question with confidence.”
A Prioritization Crisis, not a Data Crisis
The report, authored by Dan Ricci (Founder, ICS Advisory Project), Jori VanAntwerp (Founder, EmberOT), and Dr. Rishabh “George” Das (Independent OT Security Researcher), argues that the industrial security community’s challenge is not a lack of vulnerability data, but rather the absence of a structured, operationally grounded framework for determining which vulnerabilities actually warrant action.
Drawing on the ICS Advisory Project’s tracking of more than 82% of advisories that never appear in official CISA ICS channels, the report introduces a five-lens prioritization framework built around exploitability, network reachability, asset criticality, operational impact, and patch feasibility. The framework is designed to replace CVSS-score-driven triage with environment-specific risk assessment that OT teams can document and defend.
“The gap between what gets reported and what gets fixed has never been wider,” notes Dan Ricci, Founder of the ICS Advisory Project. “That’s more a prioritization problem than a resourcing problem. The ICS Advisory Project exists to give every operator, from the smallest municipal utility to the largest enterprise, the intelligence they need to make better decisions. This report is a clear expression of that mission.”
Key Findings at a Glance
The report covers 2024 and 2025 disclosure data and surfaces findings with direct operational implications:
The 1.3% Rule: Of 2,203 High/Critical CVEs tracked, only 29 (1.32%) appear in CISA’s Known Exploited Vulnerabilities catalog. The other 98.4% have never been confirmed as weaponized.
CISA Coverage in Decline: The proportion of vulnerabilities tracked by official CISA ICS Advisories fell from 28.3% in 2024 to 17.5% in 2025 – a 10.8-point drop in a single year.
The Medium Surge: Medium-severity CVEs nearly doubled year over year (558 to 1,044+), reflecting the multi-year nature of the disclosure lifecycle and warning against treating annual counts as static snapshots.
EOL and Patch Reality: 45% of advisories recommended hardware upgrades as the remediation path; 7.5% identified assets as End-of-Life with no fix forthcoming, making compensating controls a permanent architectural necessity for many operators.
Level 1 in the Crosshairs: The highest concentration of network-reachable, low-complexity vulnerabilities resides at Purdue Level 1 – the PLCs and RTUs that directly control physical processes. 1,145 vulnerabilities in this category were identified at this level alone.
High Disclosures ≠ Insecure Products: Vendors with the highest CVE counts, including Siemens (282 advisories) and Rockwell Automation (104), reflect mature PSIRT infrastructure, not weaker products. A vendor with zero CVEs may simply lack the processes to find what they have.
The Structural Gap: The Immune System That Was Never Built
Beyond the prioritization framework, the report identifies a critical gap in the current OT defense-in-depth strategy: over 80% of official guidance in the 2024-2025 period focused on network segmentation, while less than 1% addressed validation of the actual content of industrial traffic in real time.
The report introduces the concept of the “immune system” protocol-level content validation capable of detecting malformed or malicious traffic before it reaches a vulnerable device, without requiring a patch or hardware replacement. For the significant portion of the asset owner community running End-of-Life equipment or operating under constrained maintenance windows, this layer represents the only remaining path to meaningful risk reduction.
ICS/OT Vulnerability Intelligence Report Availability
The ICS/OT Vulnerability Intelligence Report 2024-2025 is available now at icsadvisoryproject.com and emberot.com. A companion practitioner guide, No Noise. Just Signal: A Practitioner’s Guide to OT Vulnerability Prioritization, containing worked examples, documentation templates, and a repeatable triage process, is forthcoming.
🔥 About EmberOT 🔥
EmberOT solves critical infrastructure security challenges by meeting organizations where they are today. Where predecessor solutions are hardware-dependent and cost-prohibitive, EmberOT’s software-based sensors remove those barriers and help organizations monitor and defend their environments NOW while showing them a path to the FUTURE. Combining secure by design with defense in depth, the EmberOT software provides immediate observability and detection, actionable insights, and guidance on “What should I do next?” to ensure critical infrastructure resilience and security. Learn more at https://www.emberot.com/
About the ICS Advisory Project
The ICS Advisory Project is an open-source analysis tool for OT asset owners, CISOs, cybersecurity analysts, and researchers to identify threats and vulnerabilities by product, vendor, and critical infrastructure sector. The project’s interactive dashboards are the result of countless hours of research, analysis, and data enrichment by founder Dan Ricci and community volunteers using CISA ICS Advisories, CVEs, MITRE ATT&CK, and other threat/vulnerability data. Learn more at https://www.icsadvisoryproject.com/.
Become a Subscriber
EMBEROT WILL NEVER SELL, RENT, LOAN, OR DISTRIBUTE YOUR EMAIL ADDRESS TO ANY THIRD PARTY. THAT’S JUST PLAIN RUDE.
