Vulnerabilities / Threats
3/26/2013
04:43 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

The Scope Of The Java Problem

New Websense data highlights why Java is attackers' favorite target: most end users run outdated versions of the app

Nearly 95 percent of endpoints actively running Java are vulnerable to at least a single Java exploit, according to new data from Websense.

The security firm decided to measure the actual state of Java vulnerability when it comes to users and their Java versions, and the numbers weren't pretty: 75 percent of end users run a version of Java in their browser that's at least six months out of date; two-thirds, a year out of date; and 50 percent, more than two years out of date. And nearly one-fourth of users employ a Java version that is more than four years old.

"It is probably no surprise that the largest single exploited vulnerability is the most recent one, with a vulnerable population of browsers at 93.77%. That's what the bad guys do — examine your security controls and find the easiest way to bypass them," according to a Websense blog post yesterday with the new data. "Grabbing a copy of the latest version of Cool and using a pre-packaged exploit is a pretty low bar to go after such a large population of vulnerable browsers."

Then there are the earlier versions of Java, prior to Version 7: some 79 percent of end users are still running that iteration of the app. The really bad news here is that the latest update to Java Development Kit 6, update 43, is the last one Oracle plans to release for that version of JDK . The software firm recommends that users move to JDK 7. "This means that more than 77 percent of users (based on requests from our research) are currently using Java version that are essentially [end of life] and will not be updated, patched or supported by Oracle," according to Websense.

The security firm got the real-time data on tens of millions of endpoints worldwide from its ThreatSeeker network. It found that only five percent of users are running the newest version of the Java Runtime Environment, 1.7.17.

Java Users Release Dates
(click image for larger view)
A look at the versions of Java Runtime Environment, based on active browser usage. Source: Websense

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
hunterpj
50%
50%
hunterpj,
User Rank: Strategist
4/4/2013 | 4:46:59 PM
re: The Scope Of The Java Problem
In the corporate world-ádisconnecting-áfrom older versions of Java is difficult. We have numerous internal applications and tools as well as external partners that do not support JDK 7. We are considering virtual systems locked down so that they just connect to our internal and partner resources when Java is required, while everyday user systems will be prevented from installing Java.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

CVE-2014-2356
Published: 2014-07-30
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.

Best of the Web
Dark Reading Radio