Data from Trusteer and Qualys puts the spotlight on trouble in the vulnerability management process. It still typically takes a month for a patch to be deployed to half of vulnerable systems, Qualys reports, while Trusteer says nearly 80 percent of the computers it scans are running vulnerable versions of Adobe Flash.
Successful exploits need not be zero-day attacks. In fact, it is often older
vulnerabilities in popular applications that are the doorknob intruders turn to
This point was underscored recently by separate research from Qualys and
Trusteer highlighting some troublesome findings in the patch
According to the July 28 Qualys report, (PDF)
the half-life of
vulnerabilities-the time it takes for 50 percent of systems to be patched-is
now typically 29.5 days. The majority of vulnerabilities are now found in
client-side applications, with most targeted attacks hitting Adobe
and Microsoft Word.
This time to remediation is virtually unchanged from 2004, though Qualys
admits a direct comparison is difficult because of the sheer number of
vulnerabilities today and the maturity of modern vulnerability management
tools. Still, Qualys
Kandek said he was struck by the fact that while IT administrators have gotten
good at patching OS vulnerabilities, admins are still taking a lot of time to
"Businesses have to test the patch deployment to assure that patches do
not break existing applications," Kandek said. "At the same time, attackers
are getting better [able] to explore new vulnerabilities ever faster. Companies
will have to find a way to patch machines faster. We believe that dividing
machines into fast and slow patch pools is a valid strategy ... [and] that
certain applications should be patched quicker than others; for example,
Internet Explorer on desktops, Office Applications [and] Adobe Reader are
applications that are attacked constantly and should be kept updated
statistics are backed up by a study released
by security company Trusteer Aug. 13,
(PDF) which reported
that nearly 80 percent of the roughly 2.5 million users Trusteer scanned
are running vulnerable versions of Flash, and nearly 84 percent are
using vulnerable versions of Acrobat Reader. The danger of leaving
security holes open for long periods is underscored by Microsoft's
Intelligence Report for the second half of 2008, which revealed that 91.3
percent of attacks against Microsoft Office exploited a vulnerability that was
patched more than two years ago (CVE-2006-2492).
Eric Ogren, principal analyst of the Ogren Group, said he was surprised to
see that the overall time to patch had not improved in the past several years.
But the biggest surprises for him in Qualys' findings were the mess and
inattention at the desktop.
"I have talked with a bunch of IT folks about patching and I tend to
get data center answers," Ogren said. "I get the need to validate and
critique patches for apps-only a moron would apply patches to a data base
system without rigorous testing. But I do not always detect a sense of
urgency for the desktop-particularly apps such as the browser, MS
Office and Adobe."
Ogren added, "IT has to know that users have Adobe, Media Player,
iPhone [software], etc., and should look to accelerate patching of application