Passive network monitoring and configuration review of [N] OT assets identified [N] vulnerabilities across the assessed environment. Of these, [N] are rated Critical or High. The most significant findings relate to unpatched firmware on critical PLCs, insecure protocol configurations, and unauthenticated historian web interfaces.
| Vuln ID | Asset / System | Finding | CVSS | Rating |
|---|---|---|---|---|
| VA-002 | PLC — [Vendor/Model REDACTED] | Firmware version [REDACTED] — known RCE vulnerability. CVE-[REDACTED]. No authentication required for exploitation on OT network segment. | 9.8 | Critical |
| VA-005 | Historian — Web Interface | Historian web interface accessible without authentication from OT network. Process data readable and downloadable by any connected host. | 8.2 | High |
| VA-009 | Engineering Workstation | Windows OS — [version REDACTED] — with [N] unpatched critical CVEs. No application whitelisting. USB ports unrestricted. | 7.8 | High |
| VA-013 | Modbus TCP — All PLCs | Modbus TCP with no authentication enabled across all PLC communications. Any host on OT segment can issue read/write commands. | 6.5 | Medium |
| VA-017 | OT Network — General | No passive monitoring solution deployed. Anomalous traffic patterns undetectable. Observed [N] unknown hosts during assessment window. | 5.3 | Medium |