25% of Known Computer Security Vulnerabilities Have No Fix

Photo of Paul Ausick
By Paul Ausick Updated Published
This post may contain links from our sponsors and affiliates, and Flywheel Publishing may receive compensation for actions taken through them.
25% of Known Computer Security Vulnerabilities Have No Fix

© scyther5 / iStock

In the first half of 2018, analysts at computer security firm Risk Based Security (RBS) published 10,644 flaws in a computer system (known as vulnerabilities) that could be exploited by a hacker to take unauthorized actions within the system. Of the total number of vulnerabilities, there is no known solution for 25.6%.

Half the reported vulnerabilities can be exploited remotely and nearly a third (32.1%) have publicly available hacks (technically known as exploits). Web-related vulnerabilities accounted for just over 46% of the total for the first half of the year.

Brian Martin, vice-president of vulnerability intelligence for Risk Based Security, said:

The task of protecting digital assets has never been so critical to businesses as we continue to see a rise in compromised organizations and data breaches. Your vulnerability intelligence solution is a cornerstone of your defense strategy.

[nativounit]

The RBS report indicates that 16.6% of the reported vulnerabilities received high or critical scores on a scale known as the common vulnerability scoring system (CVSS). The number of these types of flaws was down slightly year over year, however, the severity levels remain significant and require organizations to remain vigilant.

In the first quarter of 2018, the month of February posted both the most new vulnerabilities with the number of low-severity CVSS scores in the first half of the year and the highest number of critical vulnerabilities. RBS attributes the spike to more than 280 critical vulnerabilities patched in Samsung mobile devices.

About two-thirds of the vulnerabilities exposed in the first half of this year were due to insufficient or improper input validation, including, among other things, problematic cross-site scripting and shell command injection.

RBS notes that flaws of this kind demonstrate the difficulties software vendors face in validating untrusted input from users. The moral of the story is that companies can’t be too careful.

[recirclink id=485508]

[wallst_email_signup]

Photo of Paul Ausick
About the Author Paul Ausick →

Paul Ausick has been writing for a673b.bigscoots-temp.com for more than a decade. He has written extensively on investing in the energy, defense, and technology sectors. In a previous life, he wrote technical documentation and managed a marketing communications group in Silicon Valley.

He has a bachelor's degree in English from the University of Chicago and now lives in Montana, where he fishes for trout in the summer and stays inside during the winter.

Our $500K AI Portfolio

See us invest in our favorite AI stock ideas for free

Our Investment Portfolio

Continue Reading

Top Gaining Stocks

CBOE Vol: 1,568,143
PSKY Vol: 12,285,993
STX Vol: 7,378,346
ORCL Vol: 26,317,675
DDOG Vol: 6,247,779

Top Losing Stocks

LKQ
LKQ Vol: 4,367,433
CLX Vol: 13,260,523
SYK Vol: 4,519,455
MHK Vol: 1,859,865
AMGN Vol: 3,818,618