A new Flexera Community experience is coming on November 25th. Click here for more information.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
jbraak
By Level 5 Flexeran
Level 5 Flexeran

Total advisories:  899 (last month: 637)

The new year started with a relative high number (third highest in past 12 months) of advisories.
Please check the annual vulnerability report for a 2023 view on vulnerabilities.

Important conclusions from this month report are:

  • Almost 58% of all vulnerabilities reported in this month have a “Remote Attack Vector” (last month 53.38%)
  • The Secunia Research Team reported 9 Extremely critical advisories this month. (Last month: 3)
  • 10 Zero-Day Advisories reported. (last month :3) for mostly Apple, Microsoft, Citrix and Ivanti.
  • Over 1,766 unique CVE’s (last month: 1,518) were covered in the 899 Advisories.
  • Threat Intelligence indicates again that Moderately Critical Vulnerabilities are targeted by hackers.
  • This month 218 advisories contain at least one vulnerability linked to a Recent Cyber Exploit
  • More than half of all advisories are disclosed by these 4 usual suspect vendors (Red Hat, Oracle, Amazon and Ubuntu)
  • Interestingly among these vendors are also the ones with the most rejected advisories:
    • Red Hat: 28 out of 134 advisories were rejected by the Secunia Research Team.
    • Amazon: 26 out of 134
    • SUSE:       13 out of 134
    • Oracle:     10 out of 134
  • Juniper Networks contributed to half of all Networking related Advisories this month.

Last month we reported that 73.94% of all Secunia Advisories had a Threat (exploits, malware, ransomware, etc.) associated with them, this month the number has been a little higher to 74.86%

Using Threat Intelligence is going to help you with prioritizing what needs to be patched immediately.

Software Vulnerability – and Patch Management is becoming more and more important.
Due to the ongoing global threats, attacks on critical infrastructures in many countries are increasing.
Back in 2019 (just before Covid) patching was recommended within 30 days (or 14 days for CVSS score 7 or higher)
Right now, hackers can deploy exploits within 1 week and even within 24 hours. This means that organizations need to prioritize even better to quickly patch vulnerabilities (especially the ones with threats associated with them)