PR Newswire: news distribution, targeting and monitoring
2014

Non-Microsoft vulnerabilities account for 86% of vulnerabilities in the most popular programs

Share with Twitter Share with LinkedIn

COPENHAGEN, Denmark, March 14, 2013 /PRNewswire/ -- 86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or "third-party") programs. The result was published today in the Secunia Vulnerability Review 2013. Secunia is a leading provider of IT security solutions that enable management and control of vulnerability threats. The Secunia Vulnerability Review 2013 analyzes the evolution of software vulnerabilities from a global, industry, enterprise, and endpoint perspective.

(Photo: http://photos.prnewswire.com/prnh/20130314/PH77041 )
(Logo: http://photos.prnewswire.com/prnh/20121025/MM00581LOGO )

The Secunia Vulnerability Review findings support that the primary threat to endpoint security for corporations and private users alike comes from non-Microsoft programs, and that vulnerability and patch management efforts must span much wider than to just deal with the familiar interfaces of Microsoft software and a few usual suspects from other vendors. 

The identified 86% represent an increase from 2011, when non-Microsoft programs represented 78% of vulnerabilities discovered in the Top 50 most popular programs. The remaining 14% of vulnerabilities were found in Microsoft programs and Windows operating systems – a much lower share compared to 2011, indicating that Microsoft continues to focus on security in their products.

Number of vulnerabilities is on the increase
"Companies cannot continue to ignore or underestimate non-Microsoft programs as the major source of vulnerabilities that threaten their IT infrastructure and overall IT-security level. The number of vulnerabilities is on the increase, but many organizations continue to turn a blind eye, thereby jeopardizing their entire IT infrastructure: It only takes one vulnerability to expose a company, and no amount of processes and technology that supports operating systems and Microsoft programs will suffice in providing the required level of protection," said Morten R. Stengaard, Secunia's Director of Product Management.

The Secunia Vulnerability Review 2013 documents that the number of vulnerabilities discovered in the 50 most popular programs on private PCs has increased by 98% over the past 5 years, and non-Microsoft programs are the culprits. Consequently, it is becoming more and more necessary for companies to invest and focus on vulnerability and patch management in order to deal with the root cause of many security issues: vulnerabilities in software.

Information technology research company Gartner's research emphasizes the risk software vulnerabilities pose to organizations, and presents a strong argument for a proactive approach to getting patch management up to speed:

"Through 2015, 80% of successful attacks will exploit well-known vulnerabilities and be detectable via security monitoring. […] Applications are the gateways to the data that is the focus of a targeted attack. Dynamic application security testing (DAST) tools can be used to scan productions applications to find vulnerabilities. When a vulnerability is present on a running application, production data is at risk, and remediation cycle times are long – typically taking multiple months."(*1)

Ignore at your own peril
Gartner places "patching beyond just the OS (common applications) on all systems" among their "Best Security" recommendations for securing midmarket IT environments (*2).

Even so, IT professionals everywhere are inclined to focus on patching Microsoft programs, operating systems and just a few other programs. And ignoring the threat that vulnerabilities represent in non-Microsoft programs is both reckless and unnecessary.

'Reckless', because in the most popular 50 programs, no less than 1,137 vulnerabilities were discovered in 18 different programs - that's an average of 63 vulnerabilities per vulnerable product in the most popular programs on private PCs worldwide.

'Unnecessary', because Secunia's research also demonstrates a positive trend: In 2012, 84% of vulnerabilities had a patch available on the day they were disclosed

"This means that it is possible to remediate the majority of vulnerabilities. There is no excuse for not patching. To take advantage of this improvement in patch availability, organizations must know which programs are present on their systems and which of these programs are insecure, and then take an intelligent and prioritized approach to remediating them," said Morten R. Stengaard.

The fact that 84% of vulnerabilities have a patch available on the day of disclosure is an improvement to the previous year, 2011, in which 72% had a patch available on the day of disclosure. The most likely explanation for this improvement in 'time-to-patch' is that more researchers coordinate their vulnerability reports with vendors.

(*1): Gartner Research: "Adapting Vulnerability Management to Advanced Threats", August 2012.

(*2) Gartner Webinar: Best Practices for Securing Midmarket IT Environments, February 2013

Key findings from the Secunia Vulnerability Review 2013

1.       Non-Microsoft (third-party) programs rather than programs from Microsoft are responsible for the growth in vulnerabilities.

2.       Over a five year period, the share of third-party vulnerabilities has increased from 57% in 2007 to 86% in 2012. From 2011 to 2012 alone, the number increased from 78% to 86%.

3.       86% of vulnerabilities in 2012 affected third-party programs, by far outnumbering the 5.5% of vulnerabilities found in operating systems or the 8.5% of vulnerabilities discovered in Microsoft programs. 

In 2011, the numbers were 78% (non-Microsoft), 10% (operating systems) and 12% (Microsoft).

4.       The total number of vulnerabilities in the Top 50 most popular programs was 1,137 in 2012, showing a 98% increase in the 5 year trend. Most of these were rated by Secunia as either 'Highly critical' (78.8%) or 'Extremely critical' (5.3%).

5.       The 1,137 vulnerabilities were discovered in 18 products in the Top 50 portfolio - that's 63 vulnerabilities per vulnerable product on average.

6.       In 2012, 2,503 vulnerable products were discovered with a total of 9,776 vulnerabilities in them. That means there's an average of 4 vulnerabilities per vulnerable product.

7.       84% of vulnerabilities had patches available on the day of disclosure; therefore the power to patch end-points is in the hands of all end-users and organizations. In 2011, the number was 72%.

About the Secunia Vulnerability Review 2013
The Secunia Vulnerability Review 2013 analyzes the evolution of software security from a global, industry, enterprise, and endpoint perspective. It presents data on vulnerabilities and exploits and the availability of patches and correlates this information with the market share of programs to evaluate the true threats.  

Identifying the 50 most popular programs (the Top 50 portfolio):
To assess how exposed endpoints are, we analyze the types of products typically found on an endpoint. For this analysis we use anonymous data gathered from scans throughout 2012 of the millions of private computers which have the Secunia Personal Software Inspector (PSI) installed.

PSI users' computers have an average of 72 programs installed on them – from country to country and region to region there are variations as to which programs are installed. For the sake of clarity, we have chosen to focus on the state of a representative portfolio of the 50 most common products found on the computers. These 50 programs are comprised of 29 Microsoft programs and 21 third-party programs.

Learn more at: secunia.com/vulnerability-review

About Secunia
Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats, risks across their networks, and end-points. This is enabled by Secunia's award-winning Vulnerability Intelligence, Vulnerability Assessment, and Patch Management solutions that ensure optimal and cost-effective protection of critical information assets.

Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base. Secunia is headquartered in Copenhagen, Denmark.

For more information, please visit secunia.com

Follow Secunia

SOURCE Secunia



RELATED LINKS
http://www.secunia.com

Featured Video

Journalists and Bloggers

Visit PR Newswire for Journalists for releases, photos, ProfNet experts, and customized feeds just for Media.

View and download archived video content distributed by MultiVu on The Digital Center.

Share with Twitter Share with LinkedIn
 

Custom Packages

Browse our custom packages or build your own to meet your unique communications needs.

Start today.

 

 
 

PR Newswire Membership

Fill out a PR Newswire membership form or contact us at (888) 776-0942.

 
 

Learn about PR Newswire services

Request more information about PR Newswire products and services or call us at (888) 776-0942.

 
Area to test

Online Member Center

Not a Member?
Click Here to Join
Login
Search News Releases
Advanced Search
Search
  1. PR Newswire Services
  2. Knowledge Center
  3. Browse News Releases
  4. Contact PR Newswire
  5. Send a News Release