VULNERABILITY UPDATE February 2015 - April 2015 In this issue 1 4 Adobe Flash and 3 Windows zero-days so far 2 Cisco IOS – make sure your routers and switches are safe, too! 3 A moving target – repeat business laced with shiny new apps Total number of new vulnerabilities in the Top 20* over the 3 month period 1,691 Vendor with most vulnerable products in the 3 month period IBM secunia.com Products with the most vulnerabilities Apple Macintosh OS X Avant Browser 1 4 Adobe Flash and 3 Windows zero-days so far We have seen seven publically disclosed zero-day vulnerabilities in the first four months of 2015 – all of them in Adobe Flash Player and Microsoft Windows, two of the most widespread programs globally, on private PCs and corporate infrastructures alike. The number supports Secunia’s prediction that we would see a continuation of the 2014 trend, where the number of zero-days increased quite dramatically. And it is an alarming trend. Here’s why: A zero-day vulnerability, by Secunia’s definition, is a vulnerability that is actively exploited by hackers before it is publicly known. It can be either patched or unpatched on the day it is disclosed to the public - the requirement is that it needs to have been exploited in the wild before disclosure. The cloak-and-dagger nature of zero-days make them a perfect entry point in for example the Advanced Persistent Threat attacks: On a regular basis, zero-days are highlighted in the media and by the security industry as a popular attack methodof-choice for government agencies and private, criminal organizations, engaged in espionage and other malicious activities. The increase in zero-days is an indication that these types of attacks are becoming an increasingly commonplace type of criminal activity – and an indication that digital crime is becoming increasingly sophisticated, targeted and professional. As a side note: Although the continued high number of zero-days is a concern, it would also be a concern if we saw a dramatic drop in zero-days from end of 2014 to start of 2015. This could be a sign that the industry is failing to discover a lot of zero-days out there. And it goes without saying: the only thing worse than a zero-day you know, is a zero-day you haven’t met yet! These are the Secunia Advisories pertaining to the seven zero-days discovered in January, February, March and April 2015: SA62076, SA62432, SA62452, SA62528, SA64026, SA64059 and SA64146. 2 Cisco IOS – make sure your routers and switches are safe, too! Cisco’s operating system, Cisco IOS, was on the top 20 list for March with 23 vulnerabilities. While the number in itself is nothing spectacular, the fact that an operating system used on the many of the routers that operate the internet, and also on Cisco network switches found in many company networks globally, is interesting enough. It emphasizes the importance of never forgetting that vulnerabilities occur in all kinds of -ware. If you are an IT security professional, you know that simply monitoring and patching the high-visibility applications used in office environments is only the tip of the iceberg. Even so, it is good to be reminded every now and again that it is critical to keep track of all the software, firmware, middleware and hardware in your infrastructure. Knowing your environment means you are able to exercise damage control when vulnerabilities appear, which is critical, particularly when it comes to the less-sexy behind the scenes products that do not make the headlines: Vendors behind products that are high-profile among consumers are, generally speaking, quicker to issue patches when vulnerabilities are discovered in their products: Update-availability-speed is a requirement for consumer-facing applications, and it’s bad press to be accused of jeopardizing consumer security. Consumer-facing products from vendors like Adobe and Microsoft , for example, have standard one month patch cycles, with the resources to throw an additional patch in, for high-priority issues. For B2B products with low public awareness, response-times are frequently slower for a number of reasons, including a higher degree of complexity in patch deployment requirements and - for some - a lower prioritization of security resources in-house. In the case of Cisco, the company has a scheduled six month patch cycle for vulnerabilities that qualify for the Cisco Security Advisory, and a more ad-hoc approach on the vulnerabilities that qualify for Cisco Security Notices. Cisco does in some cases release out of band security Advisories. 3 The moving target – repeat business laced with shiny new apps Every three months, Secunia issues what we call our “Country Reports” – a set of data detailing the applications that leave private PCs in specific countries the most exposed to hacking, calculated based on whether or not users patch the vulnerable applications on their PCs. Looking at those reports, you will find the same applications and vendors figuring on the Most Exposed list quarter after quarter – it’s Oracle, Adobe, Microsoft and Apple plus a few more. Looking at the Top 20 lists in this report provides a more nuanced picture and is significant from a corporate IT perspective: While there is certainly “repeat business” every month, these lists present a wide variety of products, used in all manner of business contexts, reminding us that vulnerability management is a fickle discipline: what you patched to stay secure last month, will do your security very little good, next month! secunia.com TOP 20 FEBRUARY 2014 MARCH 2014 ID VULNS PRODUCT ID VULNS PRODUCT 1352 84 Avant Browser 24179 51 Google Chrome 56290 35 IBM Tivoli Netcool Configuration Manager 35791 32 IBM Notes (formerly IBM Lotus Notes) 36174 32 Microsoft Windows Server 2012 31967 31 Avaya Aura System Manager 33724 31 Microsoft Windows 8 37195 31 IBM Domino (formerly IBM Lotus Domino) 38138 30 Microsoft Windows RT 31152 28 Blue Coat PolicyCenter 35467 28 Blue Coat Packetshaper 12666 24 Mozilla Firefox 4761 23 Cisco IOS 1674 22 Adobe Flash Player 1907 22 Adobe AIR 16424 22 phpBugTracker 33878 22 IBM Business Process Manager 55208 22 IBM Security Access Manager for Web 11085 21 Microsoft Windows Server 2008 56112 58 IBM Power Systems 8735 57 IBM WebSphere Application Server 10130 41 IBM Hardware Management Console (HMC) 8707 25 IBM Lotus Notes Client 33724 25 Microsoft Windows 8 35791 25 IBM Notes (formerly IBM Lotus Notes) 36174 25 Microsoft Windows Server 2012 37195 25 IBM Domino (formerly IBM Lotus Domino) 38138 25 Microsoft Windows RT 37145 22 IBM Security Network Protection 24592 21 IBM Tivoli Monitoring 12666 20 Mozilla Firefox 26234 18 OSSIM (AlienVault Open Source SIM) 55842 18 AlienVault Unified Security Management (USM) 1674 16 Adobe Flash Player 8702 16 IBM InfoSphere Information Server 12789 16 MySQL 17307 15 uCosminexus Operator 11084 20 Microsoft Windows Server 2003 38512 15 uCosminexus Developer 38592 20 Microsoft Windows 7 APRIL 2015 ID VULNS PRODUCT 2372 84 Apple Macintosh OS X 24179 54 Google Chrome 24551 39 IBM Cognos Business Intelligence 10130 31 IBM Hardware Management Console (HMC) 58501 30 Oracle Solaris 10 34908 25 IBM Security Network Intrusion Prevention System 56178 25 IBM Systems Director Storage Control 666 24 Apple TV 33724 24 Microsoft Windows 8 36174 24 Microsoft Windows Server 2012 4140 22 BIG-IP Application Security Manager 18462 22 SQLite 31086 22 F5 TMOS 33276 22 BIG-IP Global Traffic Manager 36264 22 BIG-IP Local Traffic Manager 36351 22 F5 BIG-IP Access Policy Manager 38138 22 Microsoft Windows RT 56774 21 F5 BIG-IP Advanced Firewall Manager 56775 21 F5 BIG-IP Analytics (AVR) 56777 21 F5 BIG-IP Policy Enforcement Manager *: Definition of the Top 20: The Top 20 are the 20 products with the most vulnerabilities in the specified month, out of the more than 50,000 products verified by Secunia Research, and recorded in the Secunia Vulnerability Database. The Secunia ID identifies the product. Secunia Advisories cover vulnerabilities announced for all types of programs and operating systems. Disclaimer: The data in this report is a snapshot. Because Secunia Advisories are updated continuously, as new information becomes available, data in snapshots taken on different dates may vary. secunia.com
© Copyright 2024