Among the top vulnerabilities exploited in ICS/OT systems were internet-accessible devices (33%) and transient devices (27%).
Among the top vulnerabilities exploited in ICS/OT systems were internet-accessible devices (33%) and transient devices (27%). — This cybersecurity statistic was published by OPSWAT & SANS Institute in March 2025. The original data appears in 2025 ICS/OT Cybersecurity Budget Report. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
Among the top vulnerabilities exploited in ICS/OT systems were internet-accessible devices (33%) and transient devices (27%). This data was published by OPSWAT & SANS Institute.
Where does this data come from?
This statistic comes from 2025 ICS/OT Cybersecurity Budget Report, published by OPSWAT & SANS Institute on March 4, 2025. You can view the original report at https://www.opswat.com/resources/reports/ics-ot-cybersecurity-budget.
What cybersecurity topics does this cover?
This statistic was published by OPSWAT & SANS Institute. Browse more statistics from OPSWAT & SANS Institute.