Forescout has launched new analysis warning that industrial management programs (ICS) are dealing with unprecedented ranges of cyber danger, with 2025 marking the very best variety of recorded vulnerabilities up to now.
The report, ICS Cybersecurity in 2026: Vulnerabilities and the Path Ahead, reveals that 508 ICS advisories have been revealed in 2025, overlaying a complete of two,155 vulnerabilities, marking a report excessive. On the similar time, severity ranges are rising sharply, underscoring mounting dangers to essential infrastructure worldwide.
Based on the findings, the common Frequent Vulnerability Scoring System (CVSS) rating has climbed to eight.07, representing a 25% enhance since 2010. Notably, 82% of advisories are actually categorized as excessive or essential severity.
Probably the most susceptible belongings embody subject controllers, programmable logic controllers (PLCs) and SCADA programs, core elements that underpin industrial operations throughout sectors resembling manufacturing, power, transportation and healthcare.
Visibility Gaps Create Harmful Blind Spots
Past the rising quantity and severity of vulnerabilities, Forescout’s analysis highlights a regarding lack of coordinated visibility.
In 2025 alone, 134 distributors disclosed vulnerabilities with out corresponding advisories from the US Cybersecurity and Infrastructure Safety Company (CISA). Of those, 61% have been rated excessive or essential. This disconnect creates potential blind spots for defenders who depend on centralised advisories to prioritise remediation and danger administration.
Manufacturing, power and transportation stay probably the most focused sectors, reflecting their reliance on interconnected operational expertise (OT) environments and legacy programs. Nevertheless, healthcare has now surged to turn out to be the fourth most affected sector, signalling an growth of industrial-style danger into environments historically considered by means of an IT safety lens.
A 15-Yr View of Escalating Threat
Drawing on greater than 15 years of ICS advisory information, the report combines long-term development evaluation with sector-specific insights and knowledgeable commentary. The analysis paints a transparent image: industrial environments have gotten extra related, extra uncovered and tougher to defend utilizing conventional approaches.
As digital transformation accelerates throughout essential infrastructure, legacy OT programs are more and more built-in with IT networks and cloud-connected providers. Whereas this brings operational efficiencies, it additionally expands the assault floor and exposes industrial environments to threats beforehand confined to enterprise IT.
The Path Ahead
The report outlines sensible mitigation methods aimed toward lowering publicity and strengthening resilience. Key suggestions embody:
-
Bettering asset visibility throughout IT and OT environments
-
Strengthening vulnerability prioritisation processes based mostly on exploitability and operational impression
-
Closing advisory and disclosure gaps by means of higher coordination between distributors and authorities companies
-
Accelerating patch administration the place possible, whereas deploying compensating controls in environments the place patching just isn’t operationally potential
The findings reinforce a rising consensus throughout the cybersecurity neighborhood that securing essential infrastructure requires steady monitoring, cross-sector collaboration and a shift from reactive patching to proactive danger administration.







