
But the
figures, taken from the firm's Personal Software Inspector (PSI) tool, reveal a
troubling sting in the tail - if the patch wasn't available on day one it was
unlikely to be made available for some time - or possibly ever - forcing
organisations to come up with alternative and complicated fixes.
As for
vendors using open source libraries, many take week or months to patch the
small but growing clutch of serious flaws being discovered in this class of
software, a leisurely approach that looks increasingly out of touch with the
realities of software insecurity.
Secunia
recorded a total of 15,435 software vulnerabilities for the year, a figure that
has accelerated sharply since 2012 when it stood at around 10,000. In 2014,
vulnerabilities were found in 3,870 applications from 500 vendors, underlining
the complexity of the patching workload now being imposed on organisations.
Within
this, the 50 most popular applications suffered 1,348 vulnerabilities, almost
three quarters of which were rated by Secunia as 'highly' or extremely'
critical which means they required urgent patching.
Of these,
seven out of ten were Microsoft applications that were responsible for only 23
percent of the vulnerabilities. The message from this is simple - focusing on
Microsoft patching won't protect organisations because most of the risk lies
elsewhere.
Secunia
doesn't include Windows XP in any of these calculations although a surprising
12 percent of its user base were running this operating system despite its end
of life status.
As for time
to patch, the low point for patch availability was 2009 when only half of
vulnerabilities had fixes available on day one since when the percentage has
risen steadily to 2014's 83.3 percent. Thirty days later, that rises to 84.3
percent, in other words barely changes at all.
"If it
isn't patched on the day of disclosure, chances are the vendor isn't
prioritising the issue," said Secunia's director of research, Kasper
Lindgaard.
"That
means you need to move to plan B, and apply alternative fixes to mitigate the
risk."
The
improvement in the time-to-patch was most likely a result of better
coordination between researchers and vendors, which is to say that many now
have paid programmes in place designed to get early information on flaws.
Secunia doesn't
say which applications and vendors fit into the slower patching cycle but it
can be assumed that it won't be major vendors such as Microsoft or Adobe, or
browser makers Google, and Mozilla. The culprits are probably smaller vendors
without flaw disclosure programmes.
As for the
anxiety-ridden topic of zero days, once rare these are now a major aspect of
any and every
vulnerability report, rising from 14 in 2013 to 25 last year,
almost all in the top 25 most popular applications. This underlines the
importance of rapid patching.
Secunia
touches on the issue of open source flaws, timely given that several
high-profile issues were discovered during 2014 in bits of software nobody had
paid much attention to until then.
According
to Secunia, there is a major problem here because even large vendors don't seem
to be reacting rapidly to these issues. Unlike closed source software that has
gone through years of pain, there seems to be a degree of complacency among
some vendors.
Again,
Secunia doesn't name names but one vendor took 160 days to issue a patch for
the one OpenSSL flaw with a number of others taking weeks to address Heartbleed
and Shellshock. To be clear this isn't an issue to do with open source software
per se so much as the third parties using it inside their products.
"We
find that there is no general pattern to response times. Consequently,
organisations can not presume to be able to predict which vendors are
dependable and quick to react, when vulnerabilities are discovered in products
bundled with open source libraries," said Lindgaard.