A new Flexera Community experience is coming on November 25th. Click here for more information.
In January, Secunia Research issued 385 advisories from 76 unique vendors in 276 products and 394 unique versions, which is a decrease of 28.3% from December 2019.
Browsers were once again at the center of Zero-day vulnerabilities, which included Internet Explorer, Mozilla Thunderbird, and Firefox.
Linux type Operating systems were once again among top OS with most vulnerabilities.
Banking Trojan malware ‘Minerva,’ variants of ‘Zeus’ and ‘Flame Pony’ were linked to vulnerabilities in Google Chrome, MS Windows, Ubuntu, RSA Authentication manager – among others.
Internet Explorer was unpatched until February’s Patch Tuesday. It resulted in companies and government institutions issuing alerts to their users to avoid using Internet Explorer until patched.
Key Points
Call to Action
Deploy the updates, upgrades, and patches where and when available where required. For a complete list of vulnerabilities, affected versions, criticality, threat score, and relevant patch information is available in the Software Vulnerability Research and Manager tool from Flexera.
5 being the highest criticality, the below graph shows the average criticality per vendor, which is sorted based on the number of advisories.
Note: SAID stands for Secunia Advisory ID. Each advisory issued by Secunia research receives a unique identifier. We use the unique SAID number to count the advisories per vendor and the average criticality for all advisories from the same vendor; issued during January.
Secunia Research at Flexera categories the severity of vulnerabilities into five criticalities ranging from Extremely to Not Critical. It helps executives, system administrators, and Non-security people to easily understand the severity of issues.
A key differentiator is that it also rejects vulnerabilities and issue rejection notices if the exploit requires too much effort and no and less value gain. There are multiple criteria used to issue rejection notices. It helps our customers to focus on the actual Risk and threat. Sixty-four rejection notices were issued in January.
3 Critical vulnerabilities were the Zero-days in Internet Explorer, and Mozilla Firefox and Thunderbird.
If we remove Rejected advisories, then the criticality spread looks like as shown below.
1. Extremely Critical, 2. Highly Critical 3. Moderately Critical 4. Less Critical 5. Not Critical
65.5% of vulnerabilities can be exploited from remote, which makes the remediation efforts even more critical.
1. Remote. 2. Local Network. 3. Local System
CVSSv3 provides insights into the level of severity and criticality. It includes Base Score metrics, temporal score, and Environmental Score. Some parameters are constants and provided by Secunia Research, but some can be changed according to each organization’s needs and sensitivity of the affected asset.
Here we rank the Vendors and average of CVSS scores for the vulnerabilities reported in their relevant advisories.
89% of vulnerabilities had a solution, while 42% percent of reset of advisories that didn’t have a full fix had a partial fix.
The new feature in Software vulnerability Research and Software Vulnerability Management solutions helps our customers to prioritize and remediate based on the genuine threat and risk landscape.
Oracle Linux update for OpenJDK, Peoplesoft Enterprise, and Debian update for Xen had the highest threat scores of 54 and 70, respectively.
Software Vulnerability Research tool also provides further insights into why a particular vulnerability is scored higher and if it is linked to malware, cyber exploit, ransomware, or linked to vulnerability scanners.
Four instances of vulnerabilities with CVE-2019-2894 and 2 with CVE-2019-13627 were linked to Banking Trojan Minerva found in Ubuntu, Xeros Print Server, RSA authentication Manager, SUSE Linux Enterprise Server.
Vulnerabilities exploited by another banking malware ‘Flame Pony Emotet Mimikatz Zeus’ were found in Microsoft Edge, Google Chrome 79.x.
‘Zeus Chanitor CoinMiner CMRig Miner’ was linked to Ubuntu Linux, which relates to Cryptocurrency mining – as the name suggests.
‘Flame Pony Mimikatz Emotet Zeus’ was linked to vulnerabilities found in Microsoft Windows 10, Server 2016, Server 2019.
The number of vulnerabilities keeps increasing over time, which requires targeted efforts from a risk and threat intelligence approach tackling vulnerabilities affecting critical assets in an organization. CISOs, security teams, and administrators struggle to keep up with the ever-changing threat model. A reliable and effective approach to discover, analyze, prioritize, and remediate these vulnerabilities is required.
Deploy the updates, upgrades, and patches where and when available where required. A complete list of vulnerabilities affected versions, criticality, threat score, and relevant patch information are available in the Software Vulnerability Research and Software Vulnerability Manager solutions from Flexera.