header-image

US Department of Defense Urged to Address Serious IT Systems Flaws

In Security & Defense by Irene Taschek June 13, 2025

US Department of Defense Urged to Address Serious IT Systems Flaws

Credit: www.techradar.com

Key Points

  • DOD urged to fix critical IT system vulnerabilities
  • Navy shows minimal progress mitigating cyber risks
  • Lack of clear ownership hampers vulnerability management
  • Adversaries actively target U.S. critical infrastructure
  • FBI and CISA warn of escalating cyber threats
  • Binding Operational Directive mandates vulnerability remediation
  • Cybersecurity gaps risk critical military missions
  • Calls for improved documentation and risk tracking
  • Coordination needed across DOD and federal agencies
  • Urgent action required to protect national security

The U.S. Department of Defense (DOD) faces mounting pressure to address significant cybersecurity vulnerabilities in its critical IT systems, according to recent audits and federal cybersecurity agencies. Despite mandates and years of assessments, particularly within the Department of the Navy (DON), progress remains minimal in mitigating known exploited vulnerabilities that adversaries actively target. Experts warn that these unresolved flaws pose grave risks to national security, potentially degrading or incapacitating essential military operations worldwide.

Audit Reveals Minimal Progress in Mitigating Cyber Vulnerabilities

Department of the Navy’s Shortcomings

A classified audit conducted under the National Defense Authorization Act (NDAA) for Fiscal Year 2017 revealed that the Department of the Navy has made only minimal progress in addressing cybersecurity vulnerabilities identified during Defense Critical Infrastructure (DCI) evaluations. Officials were unable to provide documentation supporting mitigation efforts or implementation plans, highlighting a lack of accountability and clear ownership over critical assets and control systems.

Consequences of Inaction

The audit emphasizes that by failing to remediate these vulnerabilities, the Navy unnecessarily increases the risk that adversaries could exploit weaknesses to disrupt critical missions, impair force deployment, and compromise global military operations.

Active Cyber Threats Against U.S. Critical Infrastructure

FBI and CISA Warnings

Since January 2024, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have publicly identified aggressive targeting of U.S. critical infrastructure by nation-state actors and malicious cyber groups. Notably, Chinese government-backed hackers have sought access to telecommunications and other vital sectors, while Iranian-aligned groups have conducted attacks on water systems and other infrastructure.

Binding Operational Directive 22-01

To combat these threats, CISA maintains a Known Exploited Vulnerabilities (KEV) Catalog listing critical vulnerabilities actively targeted by attackers. The Binding Operational Directive 22-01 mandates federal agencies to remediate these vulnerabilities promptly, though compliance and enforcement remain inconsistent across DOD components.

Challenges in Vulnerability Management

Lack of Clear Ownership and Risk Management

The audit highlights systemic issues within the Navy and broader DOD, including unclear asset ownership and insufficient expectations for managing cybersecurity risks. Without clear governance, mitigation efforts stall, and vulnerabilities persist unaddressed.

Documentation and Tracking Deficiencies

Officials could not produce adequate documentation detailing actions taken or planned to mitigate risks, nor track the status of vulnerabilities effectively. This lack of transparency hinders oversight and timely response.

National Security Implications

Risks to Mission-Essential Functions

Defense Critical Infrastructure encompasses assets so vital that their incapacitation would severely degrade the DOD’s ability to fulfill its mission. Cyber vulnerabilities in these systems could allow adversaries to disrupt communications, logistics, and command and control functions critical to military readiness and operations.

Escalating Threat Environment

The evolving threat landscape, characterized by sophisticated cyber espionage and attacks from nation-states like China, Russia, and Iran, demands urgent and coordinated cybersecurity improvements. Failure to act increases the likelihood of successful cyberattacks with potentially catastrophic consequences.

Recommendations and Path Forward

Strengthening Governance and Accountability

The audit recommends that the DOD clearly establish ownership of critical assets and define responsibilities for vulnerability management to ensure accountability.

Enhancing Documentation and Risk Acceptance Processes

Implementing robust documentation practices and formal risk acceptance protocols will improve tracking and prioritization of remediation efforts.

Coordinated Federal Efforts

Greater interagency collaboration, including with CISA and FBI, is essential to share threat intelligence and coordinate defense of critical infrastructure.

Prioritizing Remediation of Known Vulnerabilities

Timely patching and mitigation of vulnerabilities listed in the KEV Catalog must be enforced rigorously across all DOD components.

The Department of Defense stands at a critical juncture in securing its IT systems against escalating cyber threats. Recent audits expose troubling gaps in vulnerability management, particularly within the Navy, underscoring the urgent need for decisive action. With adversaries actively targeting U.S. critical infrastructure, failure to address these flaws risks debilitating military capabilities and national security. Strengthened governance, improved documentation, and coordinated remediation efforts are imperative to safeguard the defense enterprise and maintain operational readiness in an increasingly contested cyber domain.


Recent News