How Vulnerable is the Connected Factory?