Vulnerabilities were found within industrial wireless Internet of Things (IIoT). The research released by OTORIO found that the vulnerabilities provide a direct path to internal operational technology (OT) networks, enabling hackers to bypass the common protection layers in the environments according to recent research. 

The research into industrial wireless IoT devices and technologies revealed an issue involving the implementation of remote access to critical infrastructure. Because wireless IIoT is commonly connected both to the internet and the internal OT network, it poses serious risk to OT environments. 

The research also found that a wireless IIoT device breach could enable hackers to simultaneously bypass every layer, including intelligent devices as well as control, manufacturing operations and business-logistics systems. Having both cloud management and wireless connectivity increases the potential attack surface. 

To combat these threats, the report recommends several architectural adjustments. A zero trust policy between cells and the control center, ensuring that if an attacker compromises a single cell, they won’t be able to reach other cells or unnecessary services. Additionally, a proxy address for internet-managed devices (industrial cellular gateways, intelligent field devices, etc.).