What Is Virtual Patching and How Does It Work in OT?
Virtual patching is the application of network-level controls that block the exploitation of a known vulnerability without requiring the vulnerable software or firmware to be updated. In OT, virtual patching typically involves configuring industrial firewall rules to block the specific network traffic that an exploit requires. If a vulnerability is exploited through Modbus TCP write commands to a specific function code, a Modbus-aware firewall rule that blocks unauthorized writes to that function code neutralizes the exploit without changing the PLC firmware. Virtual patching addresses the exploitation vector without touching the vulnerable device.
Virtual patching is not equivalent to actual patching. It addresses the specific exploitation vector for the known vulnerability, but it doesn't address the underlying vulnerability or potential future exploitation vectors. A virtual patch becomes ineffective if an attacker finds an alternative exploitation path not blocked by the current rule set. Virtual patches must be maintained and reviewed when new exploitation techniques for the same vulnerability are published. They are a risk management tool, not a permanent solution.
Implementing Virtual Patches with Industrial Firewalls
Industrial firewall virtual patches are implemented as specific allow/deny rules tied to the vulnerability being mitigated. The rule development process requires: understanding the specific network protocol and function used by the exploit, defining the source IP restrictions that limit access to authorized systems, configuring protocol-level content inspection that identifies and blocks the exploit-specific traffic pattern, testing the rule in a lab environment or in logging-only mode before enforcement, and documenting the vulnerability, the virtual patch rule, and its expected validity period. ICS-CERT advisories often include recommended network mitigations that serve as the basis for virtual patch rules.
How Do You Plan OT Patching Maintenance Windows?
OT maintenance windows for patching require significantly more planning than IT maintenance windows. A typical IT patch maintenance window involves deploying patches during off-peak hours with automated rollback capability. An OT maintenance window for patching a production control system requires: process engineering review to confirm the system can be safely stopped and restarted; utilities coordination if the system supports interconnected infrastructure; spare parts and engineering resource staging; a tested rollback procedure including the previous firmware or software version; and post-maintenance validation procedures confirming process parameters returned to expected values.
Planning timelines for OT maintenance windows range from 2-4 weeks for minor patches on non-critical systems to 3-6 months for major firmware updates on safety-critical systems that require formal validation. Organizations should maintain a forward-looking maintenance calendar that aligns vulnerability remediation priorities with planned production shutdowns, seasonal maintenance schedules, and regulatory inspection windows.
Staged Rollback Procedures
Every OT patch deployment must have a tested rollback procedure. For PLC firmware updates, rollback means reverting to the previous known-good firmware, which requires having that firmware archived and validated before the update. For SCADA software updates, rollback means restoring from a pre-patch system image. For network device firmware updates, rollback means configuration backup and documented procedure for reverting network device to prior version. Rollback procedures should be tested in a test environment before the maintenance window, and the test environment should mirror the production configuration as closely as possible.
How Do You Manage Compensating Controls for Unpatched OT?
Compensating controls for unpatched OT vulnerabilities form a layered risk mitigation strategy. Beyond virtual patching, compensating controls include: network isolation (ensuring the vulnerable device has no unnecessary network connections), access control restriction (limiting the authorized systems that can reach the device), enhanced monitoring (increasing monitoring sensitivity for the vulnerable device and generating alerts for any anomalous communication), physical access controls (limiting who can physically access the device), and formal risk acceptance with documented review dates (acknowledging the residual risk with a planned remediation timeline).
Compensating controls must be documented in the vulnerability register with the specific control applied, its expected effectiveness, and the planned remediation date. Unreviewed compensating controls that remain in place indefinitely are a governance failure: the risk doesn't decrease over time, and the controls may degrade as the environment changes. Compensating control reviews should be triggered by: passage of the planned remediation date, new exploitation techniques for the vulnerability, changes to the network environment affecting the control's effectiveness, or organizational changes affecting the risk acceptance rationale.
Frequently Asked Questions
Can I use IT vulnerability scanners in OT environments?
Standard IT vulnerability scanners (Nessus, Qualys, Rapid7) should not be used against OT devices without OT-specific scan policies, because aggressive probing can crash or freeze legacy PLCs, RTUs, and embedded devices. OT-safe scanner configurations use read-only protocol queries and avoid the SYN flood, banner-grab, and service probing techniques that IT scanners use by default. OT monitoring platforms with passive discovery are the safest vulnerability identification method, supplemented by OT-safe active scanning during maintenance windows when warranted ([NIST SP 800-82r3, 2023](https://doi.org/10.6028/NIST.SP.800-82r3)).
How do I track OT vulnerabilities across a large asset estate?
OT vulnerability tracking requires a vulnerability management platform that integrates with the asset inventory and monitors ICS-CERT advisories and vendor bulletins. Tenable OT Security, Claroty, and Dragos all provide OT vulnerability management functionality that maps CVEs against discovered assets and tracks remediation status. For organizations without a dedicated OT vulnerability management platform, a structured spreadsheet process using ICS-CERT advisory RSS feeds mapped against a maintained asset inventory is a viable intermediate step.
What is the CISA KEV catalog and how does it apply to OT?
CISA's Known Exploited Vulnerabilities (KEV) catalog is a curated list of CVEs with confirmed active exploitation. Federal agencies are required to remediate KEV catalog vulnerabilities within defined timelines. For industrial organizations, KEV catalog inclusion should trigger immediate risk assessment for any affected OT asset: if the asset has a network path and the vulnerability affects OT components, virtual patching or emergency maintenance window planning is warranted. KEV catalog updates can be subscribed to via CISA's alerting system for immediate notification ([CISA, 2024](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)).
Conclusion
OT vulnerability management demands a fundamentally different approach from IT patch management. The 70% vulnerability prevalence across OT assets combined with the 30% patchability rate creates a gap that only risk-based prioritization and compensating controls can bridge. Organizations that try to patch everything on IT timelines fail because the operational constraints don't permit it. Organizations that do nothing because the problem seems overwhelming also fail because attackers exploit the vulnerabilities they don't address.
The practical path is risk tiers, virtual patches for immediate risk reduction, and structured maintenance windows for vulnerabilities that require direct remediation. Executed consistently, this approach can reduce exploitable attack surface by 60-80% without requiring production shutdowns that the business can't absorb. That's the goal of OT vulnerability management: not zero vulnerabilities, but zero exploitable paths to high-consequence outcomes.