Vulnerabilities / Threats
3/26/2013
04:43 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

The Scope Of The Java Problem

New Websense data highlights why Java is attackers' favorite target: most end users run outdated versions of the app

Nearly 95 percent of endpoints actively running Java are vulnerable to at least a single Java exploit, according to new data from Websense.

The security firm decided to measure the actual state of Java vulnerability when it comes to users and their Java versions, and the numbers weren't pretty: 75 percent of end users run a version of Java in their browser that's at least six months out of date; two-thirds, a year out of date; and 50 percent, more than two years out of date. And nearly one-fourth of users employ a Java version that is more than four years old.

"It is probably no surprise that the largest single exploited vulnerability is the most recent one, with a vulnerable population of browsers at 93.77%. That's what the bad guys do — examine your security controls and find the easiest way to bypass them," according to a Websense blog post yesterday with the new data. "Grabbing a copy of the latest version of Cool and using a pre-packaged exploit is a pretty low bar to go after such a large population of vulnerable browsers."

Then there are the earlier versions of Java, prior to Version 7: some 79 percent of end users are still running that iteration of the app. The really bad news here is that the latest update to Java Development Kit 6, update 43, is the last one Oracle plans to release for that version of JDK . The software firm recommends that users move to JDK 7. "This means that more than 77 percent of users (based on requests from our research) are currently using Java version that are essentially [end of life] and will not be updated, patched or supported by Oracle," according to Websense.

The security firm got the real-time data on tens of millions of endpoints worldwide from its ThreatSeeker network. It found that only five percent of users are running the newest version of the Java Runtime Environment, 1.7.17.

Java Users Release Dates
(click image for larger view)
A look at the versions of Java Runtime Environment, based on active browser usage. Source: Websense

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
hunterpj
50%
50%
hunterpj,
User Rank: Apprentice
4/4/2013 | 4:46:59 PM
re: The Scope Of The Java Problem
In the corporate world-ádisconnecting-áfrom older versions of Java is difficult. We have numerous internal applications and tools as well as external partners that do not support JDK 7. We are considering virtual systems locked down so that they just connect to our internal and partner resources when Java is required, while everyday user systems will be prevented from installing Java.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web