Stuxnet will always be possible. The vulns/trojans just replace having to get someone to knowingly install it.
Or rather, will always be possible until we move to doing protocol and behavior analysis of SCADA commands (as they enter the machine). And that'll just mean it has to get more subtle. If there's a way to do it right, there're more ways to do it wrong.