The Common Vulnerabilities and Exposures database, more commonly known as CVE, lists 775 vulnerabilities for Windows 10.
For the worst offending vulnerabilities – those with a score of 9 or above – this total drops, but still stands at a staggering 134.
If we dig into the detail and roll back one version of the Microsoft operating line to Windows 8.1, we find 757 vulnerabilities. 19 of these were identified since the start of 2019.
Windows 7? The number jumps way up to 1047 known vulnerabilities.
These numbers really start to jump out as in the CVE total database there are 1548 different vendors listed. Microsoft, the largest vendor of operating systems, has a total of 6193vulnerabilities.
For reference, the number of vulnerabilities listed in the CVE database change daily – sometimes even increasing. The list of the top 50 reads as a “Who’s Who” of celebrity operating systems – of user, IoT and OT device manufacturers. This leads to a couple of simple questions for all of you senior executives. How many of these different operating systems exist on your network? The average is at least 20 different types of devices for a small to medium business.
How many devices have to be compromised before the company or brand has to report to the board that a breach has happened? Usually… just one.
We are making our networks more fluid. Faster connection speeds and more transient devices, especially on wireless. How do you account for each device and ensure that each time it connects to the YOUR network that you understand what risks it brings with it?
A better thought? This can be addressed – by orchestrating the tools you already own including network, security, and endpoint management tools. Your teams might have purchased most of the tools already needed; now you need to bring them together and ensure that you increase team productivity, harmonize cross-group operations, and provide complete & continuous visibility. This is why your teams really need complete device visibility and control with Forescout.
For more of my musings on all things cyber, click here.