What Lies Beneath: Avoiding the Unseen Dangers of OT Vulnerabilities