Laws of Vulnerabilities
Laws of Vulnerabilities
This paper describes The Laws of Vulnerabilities, which are six axioms about
the behavior of vulnerabilities gleaned from a continuous long-term research
project launched by Qualys in 2002. We analyzed a global data pool of more
than 40 million IP scans with QualysGuard, which is Qualys’ on demand
vulnerability management and policy compliance service. Data analysis
revealed The Laws of Vulnerabilities, described below. Insight from The Laws
helps security professionals to prevent exploits of IP-related vulnerabilities.
Exploitation – Nearly all damage from automated attacks is during the first 15
days of outbreak.
Source: Qualys
Data for this analysis was derived from 40,631,913 IP scans with QualysGuard
conducted globally during the period of 8 September 2002 and 31 January 2006.
About 70 percent of the data was from global enterprise scans and 30 percent
40,691,913 from random trials of QualysGuard. All scan data was anonymously gathered
without correlation to any specific user or system.
Total IP scans
There were 45,378,619 critical vulnerabilities identified by these scans. A
critical vulnerability provides an attacker with the ability to gain full control of
45,378,619 the system, and/or leakage of highly sensitive information. For example, critical
vulnerabilities may enable full read and/or write access to files, remote
Total critical execution of commands, and the presence of backdoors. QualysGuard assigns
vulnerabilities vulnerabilities like these a rating of Level 4 or 5 – the most severe threats to
identified network security. Vulnerabilities can stem from bad code, a variety of malware,
or from errors in system or network configuration.
The scans identified 1,595 unique critical vulnerabilities out of 1,972 in the
1,595 KnowledgeBase. This means 80 percent of known critical vulnerabilities
showed up in real world scans.
Unique critical
vulnerabilities Data during the last year and a half of the testing period was enhanced by rising
identified scan statistics for devices with internal-facing IPs. Initial scans with
QualysGuard were restricted to devices with external-facing IPs. Qualys later
added capability to scan IPs on the intranet using a distributed scanner
appliance. Currently, one-third of the devices scanned by QualysGuard
customers are inside the network perimeter on an intranet.
1 Half-Life
Vulnerability half-life is 19 Days on external systems and 48
days on internal systems; it doubles with lowering degrees of
severity.
Half-life is the duration of half a process. The term often connotes danger.
Half-life plays a critical role in protecting people, such as with radioactivity, or
calculating the impact of improperly using an old drug. Half-life is equally
important in understanding and preparing network defenses for malware and
Half patched other vulnerabilities.
Half of IPs with a The data show that the half-life of critical vulnerabilities is shrinking. Our
critical vulnerability analysis for The Laws in 2003 found that half-life was 30 days, applicable
are still exposed mostly to external systems. Now the half-life for external systems has shrunk to
19 days. Half-life for internal systems is 48 days.
after the respective
19 or 48 day half- The meaning of these statistics is that for even the most dangerous
life. vulnerabilities, it still takes organizations 19 days to patch half of vulnerable
external systems. Patching half of internal systems takes 48 days – more than
150 percent longer than for patching external IPs! Exposure of unpatched
systems continues during the significantly long period of half-life dissipation.
Analysis of the data reveals that the life spans of some vulnerabilities are
unlimited. One example is the SQL Slammer vulnerability, which demonstrated
a nasty and persistent recurrence. Exploitation enabled a denial of service
attack. Microsoft announced the existence of this vulnerability in July 2002 and
published a patch at the same time. The chart below shows the first and biggest
attack by a worm exploiting this vulnerability was in February 2003. The
number of vulnerable systems dropped through March, then suddenly jumped to
two-thirds of the original attack level and remained there for a few more months.
Unpatched systems are still vulnerable to this threat today.
4 Focus
Ten percent of critical vulnerabilities cause nearly all
exposure.
1
The SNMP Writable vulnerability had multiple CVE numbers, including CVE-
1999-0792, CVE-2000-0147, CV-2000-0515, CVE-2001-0380, CVE-2001-
1210, and CVE-2002-0478.
Early data in this research project noted that that 80% of critical vulnerability
exploits were available within 60 days of their public announcements. The
updated Law of Half-Life shows this period is shrinking. Half-life is now 19
days for external systems and 48 days for internal systems. Since the duration
of vulnerability announcement-to-exploit-availability is dramatically shrinking,
Patch Faster organizations must eliminate vulnerabilities faster. The updated axiom restates
Accelerated exploits the idea behind the Law of Exposure as 80 percent of critical vulnerability
exploits are available within the first half-life after their appearance.
must be patched
faster to eliminate Exposure Curve of Critical Vulnerabilities
system exposure.
Some exploits are achieving the status of “zero-day” or “near zero day,”
meaning that the exploit is available on the same day of the vulnerability
announcement. A recent example was the WMF vulnerability, also known as
Microsoft Windows Graphics Rendering Engine WMF Format Code Execution
(CVE-2005-4560). Exploitation of this vulnerability enabled execution of
remote code and user account access. Exploitation was first observed in the
wild on 26 Dec. 2005. Global scan data showed more than 50 websites were
The rapid availability of exploits like these creates significant exposure for
organizations until they patch all their vulnerable systems.
6 Exploitation
Nearly all damage from automated attacks is during the first
15 days of outbreak.
Automated attacks pose a special hazard to network security because they inflict
damage swiftly with little time for reaction. The Law of Exploitation shows that
severe damage from a vulnerability exploit is most likely to happen right after it
appears. The most recent data show that initial period of severe damage is
during the first 15 days of outbreak.
The graph below superimposes available outbreak data for six major
vulnerabilities: Blaster, Code Red, Nachi, Sasser, Slapper and Zobot. For each
critical vulnerability, the peak number of incidents occurs early after its
respective appearance and swiftly drops off.
RECOMMENDATIONS
The Laws of Vulnerabilities demonstrate that known critical risks are far more
prevalent than anyone has imagined. Data for our study document the persistent
ability of attackers to gain full control of systems – including access to highly
sensitive information such as financial data and intellectual property. The most
effective thing organizations can do to mitigate fallout from vulnerabilities is to
accelerate efforts to identify and remediate critical weaknesses. Continue use of
Qualys recommends that organizations regularly scan networks and systems for
critical vulnerabilities and set a remediation goal of shortening the half-life by
20 percent by the end of 2006. Accomplishment of this goal will reduce the
current half-life of external systems from 19 to 15 days, and of internal systems
from 48 to 38 days.
ABOUT QUALYS
With more than 2,000 subscribers ranging from small businesses to
multinational corporations, Qualys, Inc. has become the leader in on demand
vulnerability management and policy compliance. The company allows security
managers to strengthen the security of their networks effectively, conduct
automated security audits and ensure compliance with internal policies and
external regulations. Qualys' on demand technology offers customers significant
economic advantages, requiring no capital outlay or infrastructure to deploy and
manage. Its distributed scanning capabilities and unprecedented scalability
make it ideal for large, distributed organizations. Hundreds of large companies
have deployed Qualys on a global scale, including AXA, DuPont, Hershey
Foods, ICI Ltd, Novartis, Sodexho, Standard Chartered Bank and many others.
Qualys is headquartered in Redwood Shores, California, with European offices
in France, Germany and the U.K., and Asian representatives in Japan,
Singapore, Australia, Korea and the Republic of China.
Qualys, Inc.
1600 Bridge Parkway
Redwood Shores, Calif.
94065 ― USA
800.745.4355
www.qualys.com