Majority of ICS Vulnerabilities Can Be Exploited Remotely