Vulnerability tracking for OT/ICS professionals
OT vulnerability advisories are packed with technical detail that can be complex and overwhelming, especially when you're managing dozens of them a week. OTPulse translates them into plain language so you can quickly understand what's affected, what's being exploited, and what to do about it.
The question this tool answers: “I have S7-300 PLCs and Schneider EcoStruxure on my network. Do I need to do something this week?”
What OTPulse monitors
Advisory sources are checked daily. Only ICS/SCADA/OT-specific advisories appear. No general IT CVEs.
The primary US source for ICS advisories from all major OT vendors. Updated multiple times per week.
Covers SIMATIC, SINUMERIK, SCALANCE, WinCC, and the full Siemens OT portfolio. CSAF JSON format.
Security Events and Vulnerabilities Disclosures. Covers EcoStruxure, Modicon, and AVEVA products.
Covers Allen-Bradley, FactoryTalk, Logix, and related industrial automation products.
Covers ABB Ability, AC500, Relion, and industrial automation and power products.
Covers industrial networking equipment including EDS switches, protocol gateways, and serial device servers.
European ICS coordinator covering Phoenix Contact, WAGO, CODESYS, Pilz, Beckhoff, Festo, Pepperl+Fuchs, and Helmholz.
IT-in-OT coverage. Cisco IOS, IOS XE, NX-OS, and ASA/Firepower advisories that touch routers, switches, and firewalls used to segment OT networks.
IT-in-OT coverage. FortiGate, FortiManager, FortiAnalyzer, and FortiOS advisories. Fortinet edge devices commonly sit between IT and OT networks.
IT-in-OT coverage. PAN-OS, Prisma, and Cortex advisories. Palo Alto firewalls are widely deployed at the IT/OT boundary.
IT-in-OT coverage. Windows Server, Active Directory, and SMB/RPC advisories. Engineering workstations and historians often run on Windows.
Each advisory is enriched with CVSS scores from NVD, exploitation data from CISA's KEV catalog, EPSS probability scores from FIRST.org, and proof-of-concept and Metasploit module availability from public exploit databases.
How to read a card
Hover over any part of the card below to see what it means.
Remotely exploitable, could allow full system takeover, no credentials needed
Hover over any part of the card above to see what it means.
Urgency tiers reference
How each tier is determined:
| Tier | When it applies | Typical action |
|---|---|---|
| Act Now | On the CISA KEV catalog OR EPSS exploit probability > 10% | Compensating controls immediately. Escalate to operations. |
| Plan Patch | CVSS ≥ 7.0 with a fix available, or CVSS ≥ 8.0 | Schedule a maintenance window within your normal patch cycle. |
| Monitor | CVSS ≥ 4.0 without exploitation evidence | Track. Re-evaluate if exploitation status changes. |
| Low Risk | CVSS < 4.0 or low-impact local/physical issues | Log for awareness. Low priority unless specific exposure. |
Why “Act Now” needs real exploitation evidence. A 9.8 CVSS with no known exploit and a 0.1% probability of being exploited isn't the same emergency as a 7.5 CVSS that's already on CISA's KEV catalog. OTPulse only escalates to Act Now when someone is actually exploiting the vulnerability, not when CVSS alone says it would be bad if they did. High CVSS without exploitation evidence drops to Plan Patch.
How to read the detail panel
Click any advisory card to open the detail panel. Here's what each section means:
Attack Path strip
Four icons that break down how an attack works, derived from the CVSS vector:
Exploitability indicator
Fix availability
"What This Means" block
Affected Products table
Tiered remediation
Remediation checklist
How to triage a week of advisories
Monday morning, 20 minutes, new week of advisories:
Scan the top of the feed
The newest advisories are at the top, with stat cards summarizing the week (critical count, high count, vendors affected, average CVSS). The next step matters more than the stats — keep moving.
Filter to your vendors
Check the boxes for the vendors you run in the left sidebar. The feed filters immediately to show only advisories that affect your gear. No toggle, no profile setup.
Filter to Act Now
Click the Act Now chip in the top right of the feed. You'll see only advisories that are actively being exploited (KEV) or have high exploit probability (EPSS > 10%). This is the “put down your coffee” list.
Work through Act Now items
Read the impact preview, check your products, open the detail panel for compensating controls. Use w/s or arrow keys to move between advisories without leaving the keyboard. Mark dispositions as you go.
Dismiss what doesn't apply
Hover any card and click the dismiss icon to hide advisories that aren't relevant. Toggle “Show dismissed” in the toolbar to review them later. Use bulk selection to dismiss multiple at once.
Switch to Plan Patch for the patch cycle
Click Plan Patch in the top-right filters to scope the feed to advisories that need a maintenance window rather than emergency action. These go on the change calendar, not in your inbox.
Bookmark your URL
Your filter selections live in the URL. Bookmark the page once your filters are set the way you like and you'll come back to the same view next Monday.
Export for compliance
Download CSV with CVSS scores, KEV status, EPSS scores, exploit status, patch availability, action level, and your disposition states. That's your audit trail.
CVSS score vs. OTPulse urgency
CVSS scores vulnerability severity in isolation. How bad is this bug if someone exploits it? It doesn't account for whether anyone is actually trying to exploit it, whether your network makes it reachable, or whether a fix even exists.
A 9.8 CVSS requiring physical access to an air-gapped RTU is not the same as a 7.5 CVSS that's remotely exploitable and already on CISA's KEV list. OTPulse's urgency tier factors in attack vector, exploitation status, and patch availability. Three things CVSS ignores.
The raw CVSS score and EPSS probability are still shown in the detail panel for compliance reporting. They're there for reference, not as the primary triage signal.
Filter the feed
By vendor. Check the boxes for your vendors in the left sidebar. The feed filters immediately, no toggle and no profile setup. Your vendor selection persists in your browser's localStorage so it's still there next time you open OTPulse.
By urgency tier. Use the Act Now / Plan Patch / Monitor / Low Risk chips in the top right of the feed to scope to a single action level. Picking Act Now gives you only advisories that need attention right now (KEV or high EPSS). Picking Plan Patch gives you the patch-cycle backlog. The cards are color-coded to match the chips.
By sector, date range, or search. Sector chips live in the sidebar. Date range and search live in the top toolbar. Everything composes — vendor + tier + date all narrow down at once.
Keyboard shortcuts
Navigate the feed without touching your mouse:
Shortcuts are disabled when you're typing in a search box or filter input.
Dismiss and bulk actions
Dismiss hides advisories that aren't relevant to you. Hover any card and click the eye icon, or use bulk selection to dismiss several at once. Dismissed advisories stay accessible behind the “Show dismissed” toggle in the toolbar.
Bulk actions let you select multiple advisories, then export or dismiss them together. A bottom bar appears with your selection count and available actions.
Bookmarkable filters — your active filters live in the URL. Bookmark the page after setting your vendors, urgency tiers, and date range to come back to the same view next time.
Disposition tracking
Mark each advisory with a workflow state from the detail panel dropdown:
You don't have the affected product. Dismissed from active review.
Reviewed and understood. No action needed beyond monitoring.
Actively working a mitigation or patch. Stays visible with orange badge.
Patch applied or mitigation complete. Green “Done” badge.
Dispositions persist in your browser. CSV export includes disposition status for compliance audits.
Data freshness and sources
CISA ICS-CERT and vendor feeds are checked daily. CVSS scores come from the advisory (vendor-reported) and NVD. CVSS v3.1 preferred, v3.0 as fallback.
Exploitation data: CISA's KEV catalog (checked daily) and EPSS from FIRST.org (updated daily). Both are automatically applied to all advisories with CVE IDs.
Proof-of-concept and exploit availability is checked daily against two public sources: nomi-sec/PoC-in-GitHub (tracks public PoC code by CVE) and the Rapid7 Metasploit Framework module index (indicates a weaponized, production-ready exploit exists).
About the author

OT/ICS security practitioner. Built OTPulse on personal time after years of tracking ICS advisories the slow way - bookmarked vendor pages, CISA RSS, and a spreadsheet that always fell out of date. OTPulse is the tool I wanted to exist, built to make it easier for OT professionals (not just security folks) to manage vulnerability risk in their environments.
Stop reading CVEs. Start triaging them.
See what's actually urgent for your environment.
Open the vulnerability feedBuilt for the people who protect operational technology. Feedback from practitioners shapes everything. Reach us at hello@otpulse.io.