New Flexera Software Vulnerability Update: Vulnerabilities Remain High in Widely Used Operating Systems and Niche Products

Product with the most vulnerabilities between May and July 2016 is a niche solution in the healthcare industry


Itasca, IL - September 8, 2016 Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, today released a Vulnerability Update covering the Top 20 products with the most vulnerabilities inMay, June and July 2016.  According to the report, the total number of recorded vulnerabilities across these top 20 products was 2,686.

The Vulnerability Update is a recurring report based on data from Flexera Software’s Vulnerability Database.  It provides a Top 20 per month of products with the most vulnerabilities recorded over a three month period, along with brief comments from Secunia Research at Flexera Software.

High Rate of Vulnerabilities Underscores Patching Need – Especially in Operating Systems

The Vulnerability Update reveals that Microsoft was the vendor with the most vulnerabilities across the top 20 products from May through July, with a total of 518 vulnerabilities.  The four Microsoft products landing in the “top 20,” all operating system products, were Windows 10, Windows Server 2012, Windows 8 and Windows RT.

“The bad news is that the overall rate of vulnerabilities remains high, and specifically with respect to operating systems – underscoring the need for users to be diligent about patching their operating systems,” noted Kasper Lindgaard, Director of Secunia Research at Flexera Software.  “The good news is, that is exactly what is happening.  In our recently released Country Reports, the number of private PC users with unpatched Windows operating systems declined to 6.3 percent, down from 12.5 percent the previous year.”

Attack Vectors Abound in Niche Software – Just Look at Healthcare

Much of the discussion around security often focuses on high-profile vendors whose products are widely familiar.  But according to today’s report, the product with the highest number of vulnerabilities between May through July was Philips Xper Connect (272 vulnerabilities), a hospital information system.  This underscores the need to extend Software Vulnerability Management diligence across all software assets found on corporate or personal systems – not just those that are well known or most widely used.

“The healthcare industry, for instance, is a prime target for hackers looking to harvest Protected Health Information and Personally Identifiable Information for trading in the underground markets,” commented Lindgaard.  “Healthcare providers, therefore, must be aware of the software vulnerabilities that may exist in their own environments, understand the criticality of those vulnerabilities and take swift and appropriate actions to patch them before exploitation occurs.”

Download the Vulnerability Update.

# # #

Resources:

Learn more about Flexera Software’s:

FOLLOW FLEXERA

ABOUT FLEXERA

Flexera helps executives succeed at what once seemed impossible: getting clarity into, and full control of, their company’s technology “black hole.” From on-premises to the cloud, Flexera helps business leaders turn IT insights into action. With a portfolio of integrated solutions that deliver unparalleled technology insights, spend optimization and agility, Flexera helps enterprises optimize their technology footprint and realize IT’s full potential to accelerate their businesses. For over 30 years, our 1,300+ team members worldwide have been passionate about helping our more than 20,000 customers fuel business success. To learn more, visit flexera.com.

FOR MORE INFORMATION, CONTACT:



Ashleigh Giliberto
847-466-4302
agiliberto@flexera.com
*All third-party trademarks are the property of their respective owners.

Unsere Website benutzt Cookies, um Ihre bevorzugten Einstellungen zu speichern und Ihre Navigation zu optimieren. Wenn Sie diese Nachricht schließen oder auf der Website navigieren, stimmen Sie unseren Cookie-Richtlinien zu. OK, verstanden OK, verstanden