{"id":3054,"date":"2014-09-03T09:31:00","date_gmt":"2014-09-03T09:31:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2014\/09\/03\/industry-vulnerability-disclosures-trending-up\/"},"modified":"2023-05-15T23:03:57","modified_gmt":"2023-05-16T06:03:57","slug":"industry-vulnerability-disclosures-trending-up","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2014\/09\/03\/industry-vulnerability-disclosures-trending-up\/","title":{"rendered":"Industry Vulnerability Disclosures Trending Up"},"content":{"rendered":"
A vulnerability disclosure, as the term is used in the Microsoft Security Intelligence Report<\/a>, is the revelation of a software vulnerability to the public at large. Disclosures can come from a variety of sources, including publishers of the affected software, security software vendors, independent security researchers, and even malware creators.<\/p>\n The vulnerability disclosure data in the Security Intelligence Report is compiled from vulnerability disclosure data that is published in the National Vulnerability Database <\/a>(NVD). This database is the US government\u2019s repository of standards-based vulnerability management data. The NVD represents all disclosures that have a published Common Vulnerabilities and Exposures (CVE) identifier.<\/p>\n Industry-wide vulnerability disclosures trending upwards<\/strong><\/span> Not all vulnerabilities are equal \u2013 there are differences in severity and access complexity.<\/p>\n Vulnerability severity trends<\/strong><\/span> This percentage represents a significant decrease from the first half of the year, when vulnerabilities that scored 9.9 or greater accounted for 12.4 percent of all vulnerabilities. Vulnerabilities that scored between 7.0 and 9.8 increased to 25.3 percent in the second half of 2013 from 24.4 percent in the first half of the year.<\/p>\n Vulnerability access complexity trends The CVSS assigns each vulnerability a complexity ranking of Low, Medium, or High. Figure 4 shows complexity trends for vulnerabilities disclosed since the first half of 2011 (1H11). Note that Low complexity in Figure 4 indicates greater risk, just as High severity indicates greater risk.<\/p>\n Disclosures of those vulnerabilities that are the easiest to exploit, low-complexity vulnerabilities, accounted for 43.5 percent of all disclosures in the second half of 2013, a decrease from 52.9 percent in the first half of the year. Disclosures of medium-complexity vulnerabilities accounted for 51.9 percent of all disclosures in the second half of 2013, an increase from 41.9 percent in the first half of the year. Disclosures of high-complexity vulnerabilities decreased to 4.6 percent of all disclosures in the second half of 2013, down from 5.3 percent in the first half of the year.<\/p>\n Operating system, browser, and application vulnerabilities To facilitate analysis of operating system and browser vulnerabilities, the Microsoft Security Intelligence Report distinguishes among four different kinds of vulnerabilities:<\/p>\n Microsoft vulnerability disclosures<\/strong><\/span> Microsoft has been able to maintain relatively low vulnerability disclosure counts by using the Microsoft Security Development Lifecycle (SDL) \u2013 a software development methodology and toolset that is mandatory for all Microsoft products and services. In fact, Microsoft\u2019s SDL celebrated its 10 year milestone this year. If you\u2019d like more details on this story, check out an article we recently published called \u201cThe Secret of the SDL<\/a>.\u201d<\/p>\n Another interesting pivot on vulnerability data is examining which vulnerabilities actually get exploited by attackers. Data on exploitation is typically much harder to get than vulnerability disclosure data, which is why many people try to use disclosure counts as a type of proxy for what\u2019s happening in the threat landscape. A recently published study on exploit activity tells us that most vulnerabilities in Microsoft software can\u2019t be exploited, for a number of reasons. I published a series of articles based on this new research, that Microsoft\u2019s Security Science team conducted, on vulnerability exploitation that helps us understand the what, who, when, and how of exploitation.<\/p>\n What<\/strong> vulnerabilities attackers are trying to exploit most often: Who<\/strong> exploits vulnerabilities first: When<\/strong> vulnerabilities get exploited: How<\/strong> are vulnerabilities being exploited: Tim Rains A vulnerability disclosure, as the term is used in the Microsoft Security Intelligence Report<\/a>, is the revelation of a software vulnerability to the public at large. Disclosures can come from a variety of sources, including publishers of the affected software, security software vendors, independent security researchers, and even malware creators.<\/p>\n The vulnerability disclosure data in the Security Intelligence Report is compiled from vulnerability disclosure data that is published in the National Vulnerability Database <\/a>(NVD). This database is the US government’s repository of standards-based vulnerability management data. The NVD represents all disclosures that have a published Common Vulnerabilities and Exposures (CVE) identifier.<\/p>\n Industry-wide vulnerability disclosures trending upwards<\/strong><\/span>
\nFigure 1 illustrates the vulnerability disclosure trend across the entire industry since 2011. Between 2011 and the end of 2013 vulnerability disclosure counts ranged from a low of 1,926 in the second half of 2011 to a high of 2,588 in the first half of 2012; there were more than 4,000 vulnerability disclosures across the entire industry\u00a0each year during this period. For additional context<\/a>, the peak period for industrywide vulnerability disclosures was 2006-2007 when 6,000 – 7,000 vulnerabilities were disclosed each year. Vulnerability disclosures across the industry in the second half of 2013 (2H13) were up 6.5 percent from the first half of the year, and up 12.6 percent from the second half of 2012.<\/p>\n
\nThe Common Vulnerability Scoring System <\/a>(CVSS) is a standardized, platform-independent scoring system for rating IT vulnerabilities. The CVSS base metric assigns a numeric value between 0 and 10 to vulnerabilities according to severity, with higher scores representing greater severity. Vulnerabilities that scored 9.9 or greater represented 6.2 percent of all vulnerabilities disclosed in the second half of 2013. This percentage represents a significant decrease from the first half of the year, when vulnerabilities that scored 9.9 or greater accounted for 12.4 percent of all vulnerabilities. Medium severity vulnerability disclosures increased 19.1 percent between the first half and second half of 2013, and accounted for 59.3 percent of total disclosures in the second half of the year. In general, mitigating the most severe vulnerabilities first is a security best practice. Vulnerabilities that scored 9.9 or greater represent 6.2 percent of all vulnerabilities disclosed in the second half of 2013, as Figure 3 illustrates.<\/p>\n
\n<\/strong><\/span>Some vulnerabilities are easier to exploit than others. This is a characteristic that\u2019s not captured in the aforementioned severity ratings. Vulnerability complexity is an important factor to consider in determining the magnitude of the threat that a vulnerability poses. A high-severity vulnerability that can only be exploited under very specific and rare circumstances might require less immediate attention than a lower-severity vulnerability that can be exploited more easily.<\/p>\n
\n<\/strong><\/span>Comparing operating system vulnerabilities to non-operating system vulnerabilities that affect other components requires determining whether a particular program or component should be considered part of an operating system. This determination is not always simple and straightforward, given the componentized nature of modern operating systems. Some programs (media players, for example) ship by default with some operating system software but can also be downloaded from the software vendor\u2019s website and installed individually. Linux distributions, in particular, are often assembled from components developed by different teams, many of which provide crucial operating functions such as a graphical user interface (GUI) or Internet browsing.<\/p>\n\n
\n
\nMicrosoft vulnerability disclosures remained mostly stable, increasing from 174 disclosures in 1H13 to 177 in 2H13, an increase of 1.7 percent. The Microsoft percentage of all disclosures across the industry fell slightly over the same period, from 7.3 percent of all industrywide disclosures in 1H13 to 7.0 in 2H13, because of a larger increase in disclosures from other software publishers. This data highlights the importance of keeping all software up-to-date, not just Microsoft software.<\/p>\n
\nKeeping Oracle Java updated continues to be high security ROI<\/a><\/p>\n
\nWho Exploits Vulnerabilities: the Path from Disclosure to Mass Market Exploitation<\/a><\/p>\n
\nWhen Vulnerabilities are Exploited: the Timing of First Known Exploits for Remote Code Execution Vulnerabilities<\/a><\/p>\n
\nHow Vulnerabilities are Exploited: the Root Causes of Exploited Remote Code Execution CVEs<\/a><\/p>\n
\nDirector
\nTrustworthy Computing<\/p>\n
Figure 1 illustrates the vulnerability disclosure trend across the entire industry since 2011. Between 2011 and the end of 2013 vulnerability disclosure counts ranged from a low of 1,926 in the second half of 2011 to a high of 2,588 in the first half of 2012; there were more than 4,000 vulnerability disclosures across the entire industry each year during this period. For additional context<\/a>, the peak period for industrywide vulnerability disclosures was 2006-2007 when 6,000 – 7,000 vulnerabilities were disclosed each year. Vulnerability disclosures across the industry in the second half of 2013 (2H13) were up 6.5 percent from the first half of the year, and up 12.6 percent from the second half of 2012. Read more<\/a><\/p>\n","protected":false},"author":61,"featured_media":4403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3739],"tags":[],"coauthors":[1954],"class_list":["post-3054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-vulnerabilities-and-exploits"],"yoast_head":"\n