The Evolving Cybersecurity Vulnerability Landscape

In 2023, Microsoft addressed a staggering 911 vulnerabilities, with a peak of 131 in July alone. This raises questions about the urgency and risk associated with these issues. SonicWall's Capture Labs conducted an in-depth analysis of each 'Patch Tuesday' release, examining not just the number of vulnerabilities, but their practical impact. 

The cybersecurity landscape remains complex. While major vendors like Microsoft are patching vulnerabilities at rapid rates, attackers are becoming more sophisticated. 

Overall, attacks climbed 20% globally across 2023. The rise of different attack types, the increase of AI-powered threats and the prevalence of unpatched vulnerabilities highlight the need for a multi-layered approach. 

SonicWall firewalls thwarted over 3.28 million attacks related to Microsoft vulnerabilities in 2023, highlighting the importance of taking 'Patch Tuesday' seriously. The analysis revealed that while July had the highest number of vulnerabilities, December had the lowest. Microsoft also tracked vulnerabilities being actively exploited at the time of discovery, with July and November being key months.

Every year, many organisations' primary focus is on patching vulnerabilities related to Remote Code Execution. However, among the 21 exploited vulnerabilities, over half were attributed to Elevation of Privilege and nearly one-fourth to Security Feature Bypass.

This suggests that while Remote Code Execution vulnerabilities are more newsworthy, in the context of Microsoft vulnerabilities, attackers tend to exploit Elevation of Privilege vulnerabilities more frequently.

Additionally, when considering Microsoft's Exploitability Index, it revealed that while 107 vulnerabilities were more likely to be exploited, only four were added to CISA’s known exploited category post 'Patch Tuesday'. Notably, three of these were Elevation of Privilege vulnerabilities, emphasising the prevalence of attackers targeting this category.

The disparity between the number of vulnerabilities and those actually exploited underscores the need for businesses to prioritise and monitor threats effectively.

Despite often receiving lower CVSS and exploitability probability scores, Elevation of Privilege vulnerabilities are frequently the most attractive to threat actors. Therefore, organisations should prioritise these vulnerabilities in their cybersecurity strategies.

Microsoft's operating system, with a 72% market share, remains a prime target for cyber attackers. However, only about 3% of the 911 vulnerabilities addressed in 2023 were exploited. The low exploitation rate serves as a testament to Microsoft's unwavering commitment to bolstering security, illustrating the escalating difficulty for cybercriminals to exploit vulnerabilities within their ecosystem.

It's crucial to understand that cybersecurity is not a one-time task but an ongoing process. As the threat landscape evolves, so too must our strategies to counter potential attacks. This involves not only staying abreast of the latest threats and vulnerabilities but also adapting our security measures accordingly. For instance, the shift towards remote and hybrid work models has introduced new challenges, necessitating the adoption of robust endpoint security solutions. Similarly, our focus should shift from relying only on CVSS criticality score, to using a combination of data driven metrics to understand what attackers are leveraging to attack business.

By continually assessing and updating their security posture, businesses can ensure they are well-equipped to handle the dynamic nature of cyber threats, thereby safeguarding their digital assets and maintaining the trust of their customers and stakeholders.

Businesses must adopt a proactive and informed approach to safeguard against vulnerabilities. Proactive measures such as focusing on building teams to perform product security testing in addition to regular patching, prioritising critical updates, and implementing a comprehensive vulnerability management program are essential.

Regular technical audits can identify potential weaknesses, provide an understanding of important supply chain components, and partnering with a Managed Service Provider (MSP) can offer continuous monitoring and proactive defence strategies.

Above all, staying informed about the latest cybersecurity threats and trends can help businesses anticipate and prepare for potential risks, significantly reducing their susceptibility to cyberattacks.

Douglas McKee is Executive Director of Threat Research at SonicWall

Image: Allison Saeng

You Migh Also Read: 

Threat Intelligence Exposes The Extent of Cyber Attacks:

DIRECTORY OF SUPPLIERS - Threat Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Phishing-as-a-Service Platform LabHost  Is Turned Over
Securing The Paris Olympic Games »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.