Podcast: How exploitable gaps in popular networking devices show how far OT cybersecurity still has to go

Trae Mazza and his team at RMC Global found and reported hidden cyber weaknesses in common Siemens industrial networking devices. Mazza wrote this month for Smart Industry about the flaws, which Siemens has patched, and joins the podcast to review the investigation and preview how exposed to intrusion manufacturing OT really is.
Oct. 28, 2025
6 min read

What you'll learn:

  • Security gaps in industrial networks and devices crop up due to vendor constraints, financial limitations, “legacy” technologies and operational demands that prioritize uptime over cybersecurity.
  • Technical problems such as firmware, I/O subsystems or communications stacks that include legacy code or weak input validation also impair security.
  • So do broader, systemic issues, such as software that is difficult to patch due to uptime requirements or systems that require older, more vulnerable versions of software to function.

Trae Mazza and Smart Industry have a lengthy history at this point, the entire month of October, in fact.

We debuted his article on Oct. 1 on his and his company RMC Global’s investigation, after a “penetration” test for a client, of two hidden cybersecurity gaps in Siemens’ RuggedCom ROXOS II industrial network devices.

And here we are, almost to Halloween, and we’re debuting a podcast featuring Mazza and his recollections about the case and broader observations about OT cybersecurity.

On this episode of Great Question: A Manufacturing Podcast, he revisits the Siemens case and discusses what other common industrial gear could be vulnerable to cyber intrusion unless, like the Siemens devices, this equipment is monitored and patched.

See also: With MFT use growing among manufacturers, new findings see critical cybersecurity gaps

The piece was a fascinating case study into the security gaps in industrial networks and devices due to vendor constraints, financial limitations, “legacy” technologies and operational demands that prioritize uptime over cybersecurity. It was an amazing peek into just how vulnerable OT is.

We had a terrific follow-up conversation with Trae, about how industrial networks are supposed to be engineered for resilience but so often are simply not.

See also: ‘Legacy’ cyber risk: How to prepare OT for system updates

This often happens for technical reasons (he mentions firmware, I/O subsystems or communications stacks that might include legacy code or weak input validation) but also because of broader, systemic issues, such as their software is difficult to patch due to uptime requirements or their systems require older, more vulnerable versions of software to function. Many OT devices were built without modern cybersecurity in mind, he also offered during the “pod.”

So, please give a listen!

Below is an excerpt from the podcast:

SA: What about authentication—which your story talked about — weak or default credentials being a common risk factor. What needs to change here?

TM: Organizations implementing devices should have policies and procedures in place that require new devices placed on the network to have their default passwords changed to strong passwords that meet the organizational requirements.

From an organizational perspective, companies should have some form of a checklist for a device being onboarded into the network, and one of the checks should be changing all the known passwords on the device.

See also: Patchwork of tech, siloed staff plantwide can make for cybersecurity nightmares

That said, policies and procedures without technical controls from the vendor are not always followed or enforceable. So, there could be a simple mistake in the deployment process where someone didn’t change the passwords—or even just an undocumented account that the OT company doesn’t know about, that was put there by the vendor.

For device or application vendors, they should kind of “shift left,” which in the security space means security should be baked into the device development process at the earliest stages.

For authentication specifically, randomized passwords out of the factory—or requiring the end user to change the password at first login—should be the standard. Additionally, vendors should have a baseline password complexity requirement that can be modified by users to fit their individual standards and needs.

About the Author

Scott Achelpohl

Head of Content

I've come to Smart Industry after stints in business-to-business journalism covering U.S. trucking and transportation for FleetOwner, a sister website and magazine of SI’s at Endeavor Business Media, and branches of the U.S. military for Navy League of the United States. I'm a graduate of the University of Kansas and the William Allen White School of Journalism with many years of media experience inside and outside B2B journalism. I'm a wordsmith by nature, and I edit Smart Industry and report and write all kinds of news and interactive media on the digital transformation of manufacturing.

Sign up for our eNewsletters
Get the latest news and updates