Copenhagen, Denmark - Aug 10, 2015 - Secunia, a leading provider of IT security solutions that enable management and control of vulnerability threats, has taken an early peek at the trend in vulnerabilities for 2015. Seven months into the year, the number of detected zero-day vulnerabilities has risen substantially compared to 2014, while the total number of vulnerabilities is largely the same as this time last year.
15 zero-days have been discovered so far in 2015, making it likely that the total 2015 number will exceed the 25 discovered in 2014. The 2015 zero-days were all discovered in popular Adobe and Microsoft products widely in use across private and professional IT systems.
“The increasing number of zero-days is not a surprise. It would be more of a concern if the number dropped, because that would mean that the zero-days we can be sure are out there were going undetected – after all, Hacking Team, the Italian company reported to be selling a product utilizing bought zero-days to governments and corporations, is not the only company of its kind out there,” said Kasper Lindgaard, Director of Research and Security at Secunia.
At 9,225 the total number of vulnerabilities discovered from January 1 to July 31st is on a par with the 9,560 discovered over the same period in 2014, but Secunia’s preliminary findings do indicate a shift in criticality ratings: A slightly higher share of the vulnerabilities discovered are rated as “extremely critical” (from 0.3% to 0.5%) and “highly critical” (from 11.1% to 12.7%) while there is a drop in the “moderately critical” category (from 28.2% to 23.7%).
Secunia has also taken a look at the number of vulnerabilities discovered in the two most popular operating systems on mobile phones: around 80 vulnerabilities have been discovered in iOS, and approximately 10 in Android.
“The fact that fewer vulnerabilities are discovered in Android should under no circumstances be misinterpreted to imply that Android OS is more secure than iOS. The trouble with a vulnerability in Android OS is that Google, the vendor behind the operating system, has no control of its patch status on majority of the devices that run it, because those devices are produced and maintained by third-party vendors. The “Stagefright” vulnerabilities discovered by Zimperium, which was disclosed last week, is a perfect example of the problem: Google has acted quickly and issued a patch, but from there on it’s up to phone vendors– Samsung, HTC, Sony, etc. – to push the patch live to the users. In comparison, Apple can issue patches and push updates directly to all devices running iOS – a much more controlled process,” said Kasper Lindgaard.
Secunia Research has compared the number of vulnerabilities discovered in distinct core products, used in corporate IT infrastructures, from seven major vendors: IBM, Citrix, Hitachi, HP, Juniper, Oracle and VMware:
“Hundreds of different products from these vendors contain vulnerabilities, and it is important to remember to also focus on these. On private PCs you will find the same vulnerable applications from the same vendors again and again, but in the corporate environment the list of vulnerable products is far more nuanced. While there is certainly ‘repeat business’ every month, the corporate environment contains a wide variety of products, used in all manner of business contexts, with code that is just as flawed as any other code. This means that what you patched to stay secure last month will do your security very little good next month. It is an extremely complicated task to keep your corporate environment fully patched at all times,” Kasper Lindgaard stated.
Since the Heartbleed vulnerability in OpenSSL opened the can of worms that is vulnerabilities in open source libraries in April 2014, several additional vulnerabilities have been discovered in OpenSSL and users of the library have been hit by 5 distinct waves. OpenSSL #5 has been doing the rounds for two months and appears to be following the trail of OpenSSL #4. So far, some 100 products have been reported vulnerable by OpenSSL#5, which is a far cry from the 800 reported vulnerable by OpenSSL #2 last year. The discrepancy in the two numbers indicates that a lot of products out there are vulnerable, even though the vendors have not reported them as such.
“The fact that vendors do not report to their customers that products have been made vulnerable by OpenSSL, and consequently do not offer solutions to the customers on how they should mitigate and protect their infrastructure, makes it very hard for users to secure their environment. Because OpenSSL comes bundled in many third-party products, customers are not necessarily aware that they have it in their inventory, and so cannot take appropriate action,” explained Kasper Lindgaard.
Flexera is reimagining the way software is bought, sold, managed and secured. We view the software industry as a supply chain, and make the business of buying and selling software and technology asset data more profitable, secure, and effective. Our Monetization and Security solutions help software sellers transform their business models, grow recurring revenues and minimize open source risk. Our Vulnerability and Software Asset Management (SAM) solutions strip waste and unpredictability out of procuring software, helping companies buy only the software and cloud services they need, manage what they have, and reduce compliance and security risk. Powering these solutions and the entire software supply chain, Flexera has built the world’s largest and most comprehensive repository of market intelligence on technology assets. In business for 30+ years, our 1300+ employees are passionate about helping our 80,000+ customers generate millions in ROI every year. Visit us at www.flexera.com.
*All third-party trademarks are the property of their respective owners.