UII UPDATE 412 | SEPTEMBER 2025
Uptime Intelligence has shown that operational technology (OT) systems are more vulnerable to cyberattacks than many data center operators realize (see Seven fallacies of data center cybersecurity). One-third of operators now cite phishing as the primary cause of their most impactful cyberattack, according to the Uptime Institute Data Center Security Survey 2025 (see Cybersecurity incidents grow costlier amid persistent complexity). This is followed by ransomware/malware (11%) and misconfigured systems (11%).
Many operators still rely on legacy OT equipment and software that may be a decade or more old — designed without modern cybersecurity protections. OT systems, such as supervisory control and data acquisition (SCADA) systems, building management systems (BMS), and programmable logic controllers (PLCs), have multiple points of vulnerability. Many rely on web consoles and internet connectivity for remote management, support, training and system updates, while analytical functions, such as predictive maintenance, often require access to cloud systems and data sharing.
Web consoles and browsers are de facto cyber targets and therefore require the highest levels of security. Despite this, many remain unencrypted and insecurely connected. Cyberattackers can exploit existing weaknesses within OT protocols to gain access to facility networks and subsequently exploit web console vulnerabilities. Once compromised, OT systems can fall victim to phishing attacks, data and code manipulations, or even system hijacks.
Air gaps that once provided security by separating IT and OT networks are no longer practical. Today, OT systems need to deliver real-time data and perform analytics across different networks, systems and platforms. They may need to integrate with IT management tools — for example, data center infrastructure management (DCIM), a configuration management database (CMDB) and IT service management (ITSM) — as well as Internet of Things (IoT) devices, such as sensors, mobile networks and IP-based cameras. This network convergence increases both complexity and risk.
Most OT systems rely on inherently insecure out-of-band messaging protocols, such as BACnet, Modbus and OPC. If these protocols are not updated or are no longer supported, existing security tools such as firewalls are unlikely to provide adequate protection. Meanwhile, the rapid expansion of OT malware and ransomware is increasing the likelihood of zero-day incidents, leading to high-risk common vulnerabilities and exposures (CVEs) that threaten facility OT and IT systems (see Ransomware incidents on OT equipment surge).
PLCs and other industrial control systems (ICS) are typically integrated hardware and software tools. Standalone OT software products — such as SCADA and BMS — are also widely used across multi-vendor environments (see Table 1).
Both types of OT systems collect and store critical operational data from inside and outside the data center. SCADA, for example, may connect internal power distribution systems with external third-party energy supply systems. BMS may connect to facility cooling and security systems, as well as DCIM and ITSM tools, which often require integration into the IT network.
The data captured by an OT system likely includes:
For this report, Uptime Intelligence examined the CVEs attributed to four well-known data center OT product vendors: Honeywell, Johnson Controls, Schneider Electric and Siemens. These vendors proactively monitor, document and provide guidance for customers. There are dozens more OT product vendors that may be investigated in future reports.
Across these four suppliers, Uptime Intelligence discovered 88 CVEs issued between December 2024 and August 2025 — a 13% increase on the 78 identified in the previous 12 months — indicating a significant year-on-year rise (see Table 1).
A similar table is available in Part 1 of this series (see DCIM vulnerabilities increase threat of cyberattacks), which can be used for comparison purposes.
Table 1 Publicly available CVEs and average CVSS ratings (2025 vs 2024)
The average CVSS (Common Vulnerability Scoring System) rating of all identified CVEs in 2025 stands at 7.7 (High) out of 10, compared with 7.0 in 2024 — equivalent to a 10-percentage point increase in severity.
By comparison, the average CVSS score of DCIM products identified in Part 1 is 6.4 (Medium). This suggests that OT systems are significantly more vulnerable than DCIM software products.
Table 2 shows that between January and August 2025, there were seven OT CVEs rated Critical (CVSS rating of 9.0 or higher). Critical risks accounted for 8% of the total CVEs identified in 2025. By comparison, only one DCIM CVE was recognized as Critical.
Table 2 Seven OT software CVEs rated Critical, 2025
Most of the vulnerabilities identified in Table 2 reflect common weaknesses in protecting operational and system data.
These OT systems often implicitly trust the data they receive or input by users on the network. This lack of guardrails is a zero-trust failure to verify information before it is processed. As a result, attackers may trick users into performing unsafe but “trusted” actions, which corrupt system data or — in the most serious cases — execute malicious code in the underlying OT operating system. Not only do these vulnerabilities increase the risk of malfunctions and denial-of-service (DoS) attacks, but they also significantly increase the risk of attackers pivoting to malware and ransomware exploits.
Figure 1 Most identified OT weaknesses, 2025
Figure 1 above highlights the five most identified OT weaknesses, all of which involve the cyberattacker(s) exploiting the OT software’s implicit trust of compromised OT networks. There are two categories of exploits identified:
Harmful data and user inputs are not recognized:
Harmful web inputs are not recognized:
The first line of defense should always be patching vulnerable systems to address identified vulnerabilities. However, since many OT systems may be too old to be patched, they will be at even greater risk of compromise.
Legacy systems are also unlikely to support modern cybersecurity tools, such as multi-factor authentication and single sign-on, which help prevent unauthorized access. Regardless of whether environments are new or legacy, all data center operators should ensure that fundamental security measures are in place to limit exposure:
Where possible:
Uptime Intelligence’s research suggests that critical OT vulnerabilities are both more common and more severe than many operators may realize. Aging legacy systems, insecure OT networks and software systems lacking protective guardrails make facility OT equipment an easy target for cybercriminals.
OT software vendors need to address these vulnerabilities by detecting, alerting and quarantining untrusted data that may contain malicious attacks.
Organizations running OT systems that are a decade or more old should consider upgrading. However, even modern OT systems are vulnerable. The growing number of CVEs demonstrate that many OT systems lack adequate cyber defenses to protect systems and data. As CVEs continue to increase in both number and severity, customers and operators will remain at high risk.
Other related reports published by Uptime Institute include:
Cybersecurity incidents grow costlier amid persistent complexity
DCIM vulnerabilities increase threat of cyberattacks
Ransomware incidents on OT equipment surge