Tracking NERC CIP regulatory updates, ICS/OT vulnerabilities, and cybersecurity threats targeting the Bulk Electric System and critical infrastructure sectors.
14Active CIP Standards
2,155ICS CVEs in 2025
9.8Highest CVSS This Month
3CIP Updates in 2026
// Latest Updates
NERC CIP & Infrastructure Security News
Recent regulatory actions, standards updates, and sector-wide cybersecurity developments.
FERC unanimously approved 11 updated CIP Reliability Standards for secure virtualization, plus CIP-003-11 strengthening baseline security controls for low-impact BES Cyber Systems, including new remote access and intrusion detection requirements.
The new strategy frames cybersecurity as national power, emphasizing offensive & defensive operations, zero-trust modernization, post-quantum cryptography, and hardening critical infrastructure including energy, telecom, and water sectors.
The CIP Roadmap identifies key risk areas outpacing current standards: low-impact system aggregation risk, telecom dependency for SCADA/AGC, universal MFA expansion, and foundational cyber hygiene gaps across the Bulk Power System.
A ransomware attack hit Spain's Port of Vigo, forcing authorities to disconnect digital cargo management systems and temporarily switch to manual operations. This follows a pattern of escalating attacks on maritime critical infrastructure.
Record 2,155 ICS CVEs in 2025, Average CVSS Hits 8.07
Forescout reports a record 508 ICS advisories covering 2,155 CVEs in 2025, with 82% reaching high or critical severity. CISA tracked only 22% of vendor-published vulnerabilities, leaving major blind spots for energy sector operators.
Survey of 100+ Energy OT Sites Reveals Widespread Gaps
OMICRON study found critical issues within 30 minutes at most sites: unpatched devices, flat networks, undocumented external connections (50+ per substation), and insecure PLC debugging functions left active in production.
Security management controls for low-impact BES Cyber Systems. Requirement R1 Part 1.2.6 (vendor electronic remote access controls) must be fully implemented on day one.
July 1, 2026
CIP-012-2 Effective Date
Communications between Control Centers. Requires documented plans to mitigate unauthorized disclosure, modification, and loss of availability of real-time operational data in transit.
2026 Development
CIP-002-8 Approved (Control Center Definition)
FERC approved the updated "control center" definition expanding scope to Transmission Owners. Effective date follows CIP-002-7 or first calendar quarter 3 months after FERC approval.
Eleven updated CIP Reliability Standards support secure use of virtualization technologies. CIP-003-11 introduces new baseline security controls for low-impact BES Cyber Systems including remote access password safeguards and intrusion detection. The rule also approved CIP-002-8 with updated control center definition.
CISA now has 1,000 vacancies after workforce cuts. Six members of a highly technical threat hunting and incident response team resigned in a single day. Remaining personnel carry out mission-essential functions without pay while facing increasing pressure from nation-state and criminal actors.
NERC CIP Roadmap: Coverage Gaps and Emerging Risks
The 2026 Roadmap warns that OT enabling generation, transmission, and balancing now sits outside medium- and high-impact CIP coverage. Key themes: universal MFA, encryption for "last mile" communications, foundational cyber hygiene, and IBR-specific risk assessments.
CIP-003-9 (effective April 1) refines security management controls for supply chain and low-impact environments. CIP-012-2 (effective July 1) requires confidentiality, integrity, and availability protections for real-time data between control centers.
Documented incidents across Germany, Denmark, Finland, and the Baltics confirm state-aligned threat actors targeting physical systems. Russia's Sandworm and China's Volt Typhoon actively targeting European energy OT. EU NIS2 creates enforceable obligations with fines up to 10M EUR.
2025 set a record with 508 ICS advisories covering 2,155 CVEs. Average CVSS climbed to 8.07 (up 25% since 2010). 134 vendors published ICS vulnerabilities without CISA advisories. 61% of non-CISA vulns were high/critical severity.
Energy OT Survey: Critical Issues Found in Minutes
OMICRON study of 100+ energy installations found unpatched devices, undocumented external connections (50+ per substation), unused Windows file sharing services, IPv6 services, and insecure PLC debugging functions in production substations.
Energy Sector: 67% Hit by Ransomware, 80% Data Encrypted
Energy, oil, and utilities organizations face ransomware at rates exceeding other sectors. 60% of critical infrastructure attacks attributed to nation-state actors. Energy ranks 4th most targeted sector, accounting for 10% of all incidents.
CIP Roadmap: Protecting PLCs and RTUs in Power Generation
The Roadmap warns that coordinated attacks on multiple "low impact" assets can aggregate into high-impact events. Salt Typhoon campaign targeting telecom infrastructure threatens unencrypted SCADA/AGC data. Recommends extending CIP-012 scope and MFA to low-impact systems.
PwC reports nation-state rivals running long-term campaigns using credential harvesting and LOTL tactics to infiltrate IT and OT systems. Tech debt from decades-old OT systems connected to modern digital infrastructure creates escalating risk without matching cyber maturity.
Recent CISA ICS Advisories and critical vulnerabilities impacting energy, manufacturing, and critical infrastructure sectors.
CVE / Advisory
Severity
CVSS
Vendor / Product
Affected Sectors
Description
CVE-2026-22553
Critical
9.8
InSAT
MasterSCADA BUK-TS
EnergyManufacturing
OS Command Injection in SCADA/OT environments. Remote code execution without authentication. Immediate patching and OT network isolation required.
CVE-2021-22681
Critical
10.0
Rockwell Automation
Multiple ICS Products (PLCs)
EnergyManufacturing
Now actively exploited (added to CISA KEV). Allows remote attackers to impersonate engineering workstations and manipulate PLCs. Urgent patching required.
CVE-2025-12807
High
8.8
Rockwell Automation
FactoryTalk DataMosaix Private Cloud
Manufacturing
SQL Injection via exposed API endpoints. Low-privilege users can perform unauthorized sensitive database operations. Versions 7.11, 8.00, 8.01 affected.
CVE-2025-9368
High
7.5
Rockwell Automation
432ES-IG3 GuardLink EtherNet/IP
Manufacturing
Resource allocation without limits. DoS condition requiring manual power cycle. Update to V2.001.9 or later recommended.
Synology-SA-26:03
Critical
9.0+
Synology
DiskStation Manager (DSM)
ITEnterprise
Unauthenticated remote command execution on NAS devices. Immediate security update required for all DSM deployments.
ICSA-26-085
High
7.8
WAGO GmbH
Industrial Managed Switches
Energy
Vulnerabilities in industrial managed switches used in energy sector. CISA advisory released March 26, 2026. Check and address across ICS/SCADA environments.
ICSA-26-083
High
8.1
Schneider Electric
Plant iT / Brewmaxx
EnergyManufacturing
Vulnerabilities in process automation software used in energy sector. CISA advisory released March 24, 2026.
ICSA-26-083
Medium
6.5
Honeywell
IQ4 Series BMS Controller
BuildingsEnergy
Building Management System controller vulnerability. Updated advisory (Update A) released March 26, 2026.
CVE-2026-1995
High
7.8
IDrive
Cloud Backup Client for Windows
ITEnterprise
Local privilege escalation. Authenticated low-privilege attackers can execute arbitrary code with system-level permissions.
Tracking Note: CISA/ICS-CERT has published 3,637 ICS advisories covering 12,174 vulnerabilities affecting 2,783 products from 689 vendors since 2010. However, 134 additional vendors published ICS vulnerabilities without associated CISA advisories in 2025 alone, with 61% of those carrying high or critical severity. Monitor vendor disclosures directly alongside CISA advisories.
The 14 NERC CIP standards (CIP-002 through CIP-015) define cybersecurity requirements for entities operating on the North American Bulk Electric System.
CIP-002
BES Cyber System Categorization
Identify and categorize BES Cyber Systems and their associated assets for the application of cybersecurity requirements commensurate with their impact on the BES.
CIP-002-8 Approved
CIP-003
Security Management Controls
Specify consistent and sustainable security management controls that establish responsibility and accountability for BES Cyber System security.
CIP-003-9 Apr 2026 / CIP-003-11 Approved
CIP-004
Personnel & Training
Minimize risk from individuals accessing BES Cyber Systems by requiring appropriate personnel risk assessment, training, and access management.
Active
CIP-005
Electronic Security Perimeter(s)
Manage electronic access to BES Cyber Systems by specifying controlled Electronic Security Perimeters and requiring MFA for interactive remote access.
Active
CIP-006
Physical Security of BES Cyber Systems
Manage physical access to BES Cyber Systems by specifying a physical security plan for the protection of BES Cyber Systems.
Active
CIP-007
System Security Management
Manage system security by specifying select technical, operational, and procedural requirements in support of protecting BES Cyber Systems.
Active
CIP-008
Incident Reporting & Response Planning
Mitigate risk from cyber security incidents by specifying incident response requirements for identification, classification, response, and reporting.
CIP-008-8 In Development
CIP-009
Recovery Plans for BES Cyber Systems
Recover reliability functions performed by BES Cyber Systems by specifying recovery plan requirements in support of the continued stability and operability of the BES.
Prevent and detect unauthorized changes to BES Cyber Systems by specifying configuration change management and vulnerability assessment requirements.
Active
CIP-011
Information Protection
Prevent unauthorized access to BES Cyber System Information by specifying information protection requirements.
Active
CIP-012
Communications Between Control Centers
Protect the confidentiality, integrity, and availability of real-time assessment and monitoring data transmitted between control centers.
CIP-012-2 Jul 2026
CIP-013
Supply Chain Risk Management
Mitigate cybersecurity risks to the BES by implementing security controls for supply chain risk management of BES Cyber Systems.
Active
CIP-014
Physical Security
Identify and protect Transmission Stations and Substations and primary control centers that if rendered inoperable could result in widespread grid instability.
Risk Assessment Refinement 2026
CIP-015
Internal Network Security Monitoring
Requires INSM for High and Medium Impact BES Cyber Systems with External Routable Connectivity. Newest CIP standard addressing internal visibility gaps.
Effective Sep 2025 / Compliance Oct 2028
// Trusted Sources
NERC CIP & Cybersecurity Resources
Curated links to official standards, intelligence feeds, and critical infrastructure security guidance.