Trend Micro says decline in quality of security patches

Share
Trend Micro says a zero day Initiative pushes vendors to do better by changing disclosure policies.

Global cybersecurity company Trend Micro, has warned that a growing number of incomplete or faulty patches could be costing organisations upwards of $400,000 per update.

Speaking at Black Hat USA 2022, representatives from Trend Micro's Zero Day Initiative (ZDI) revealed policy changes designed to address a significant decline in both the quality of patches and vendor communication with customers.

ZDI, the world's largest vendor-agnostic bug bounty program responsible for nearly 64% of all vulnerabilities disclosed in 2021, revealed policy changes to address declines in both the quality of patches and vendor communication with customers.

Brian Gorenc, senior director of vulnerability research and head of the ZDI, shared his perspective: "The ZDI has disclosed over 10,000 vulnerabilities to vendors since 2005, but we've never been more concerned about the state of security patches across the industry. Vendors that release inadequate patches with confusing advisories are costing their customers significant time and money and adding unnecessary business risk," he said.

The ZDI has identified three primary issues resulting from vendors releasing faulty or otherwise incomplete patches:

  • Due to flawed vendor practices, enterprises no longer have a clear view of the true risk to their networks.
  • Due to incomplete and faulty updates, enterprises spend additional time and money patching what they've already patched.
  • Due to falsely believing remediation has occurred, a failed patch results in more risk than no patch at all.

These scenarios effectively multiply the cost of patching because additional, corrective updates will be required to remediate a single vulnerability – wasting business resources and adding risk.

In addition, a growing reluctance among vendors to deliver authoritative information on patches in plain language leaves network defenders unable to accurately gauge their risk exposure.

Disclosure Policy

The ZDI is therefore changing its disclosure policy for ineffective patches in a bid to drive industry-wide improvements. Moving forward, the standard 120-day timeline will be reduced for bugs believed to be the result of a bypassed security patch, as follows:

  • 30 days for the most Critical-rated cases where exploitation is expected
  • 60 days for Critical- and High-severity bugs where the Patch offers some protections
  • 90 days for other severities where no imminent exploitation is expected

Even when patches are properly engineered, they can unintentionally increase risk by alerting threat actors to the underlying vulnerability. Few organizations' time-to-patch is quicker than the time-to-exploit. When patches are incomplete or faulty, the risk of compromise is multiplied.

Although patch costs differ between enterprises, Trend Micro calculated the cost of faulty patches with the following formula: Total costs = f (T, HR, S, PF) where T is Time spent on patch management, HR is Human Resources costs needed for patch management specialists, S is scope defining the number of applications to be patched, and PF is patch frequency, which can be every 2-3 week for some applications.

It is not uncommon for patch costs within medium-to-large enterprises to exceed six figures every month. Regardless of the formula used to calculate patch expenditures, applying multiple updates for the same vulnerability costs enterprises real time and money while exposing them to unneeded risk.

To better understand and mitigate these risks, Trend Micro recommends that organisations:

  • Develop rigorous asset discovery and management programs
  • Wherever possible, vote with their wallets for the most trustworthy vendors
  • Conduct risk assessments that go beyond Patch Tuesday—for example, by monitoring for patch revisions and closely observing for changes to the threat landscape.

 

Share

Featured Articles

BT's Security Chief: Why AI Poses Such a Risk to Security

BT’s security chief Tris Morgan says the telecommunications group logs 200 million potential cyber attacks daily as AI drives new security challenges

How Supply Chain Cyber Threats Cost The Global Economy

Interos.ai reports physical infrastructure attacks and AI system vulnerabilities emerging as primary concerns for security leaders

How Kroll and DORA Tackle Supply Chain Cybersecurity Risks

Kroll experts highlight critical measures IT providers must adopt to protect supply chains from cyber attacks and mitigate risks from AI-enabled threats

VCARB & Dynatrace Accelerate AI For F1 Racing Performance

Technology & AI

Apple's Siri: How The Most Private AI Assistant Works

Operational Security

How The UK’s AI Plan Will Impact The Cybersecurity Sector

Technology & AI