Microsoft pooh-poohs zero-day threats, but what's the truth?

Zero-day vulnerability risks? Pshaw. A new report downplays the concern of the effects of the exploits.

Microsoft says in the report that they aren't the biggest risk for organizations and PC users.     

According to Microsoft, only 0.12 percent of all software exploits in the first half of this year were associated with "zero-day" malware, which taps into unpublicized security vulnerabilities in software. The company disclosed this information in its biannual Microsoft Security Intelligence Report, released this week. In it, Microsoft reported that over 99 percent of the remaining attacks "distributed malware through familiar techniques, such as social engineering and unpatched vulnerabilities."

"The risk associated with zero-day exploits is real and should be represented in organizations' risk management plans," said Tim Robbins, director of product management in Microsoft’s Trustworthy Computing group, in a blog post. "That said, the data in this study helps put that risk into perspective relative to the top malware threats and exploit attempts observed in use on the Internet."

Microsoft attributed the low number of actual zero-day exploits to the diligence of security vendors providing patches and detection signatures quickly after a vulnerability is discovered. Microsoft provided some examples, pointing to two Adobe zero-day exploits that made up the majority of the 0.12 percent of attacks in the first half of 2011. Adobe released an update to its Flash player less than a week after the first zero-day incident was reported and issued a fix two days after a June 12 exploit incident occurred.

Many software security vendors emphasize zero-day exploits because of the implicit newness of the vulnerability.

"The zero-day vulnerability is especially alarming for consumers and IT professionals, and for good reason -- it combines fear of the unknown and an inability to fix the vulnerability, which leaves users and administrators feeling defenseless," Microsoft wrote in the report. "It's no surprise that zero-day vulnerabilities often receive considerable coverage in the press when they arise, and can be treated with the utmost level of urgency by the affected vendor and the vendors' customers."

However, Microsoft took a slightly different view in the SIRS report. While diligence is not a bad policy, these zero-day attacks are miniscule compared with the totality of security issues.

inside gcn

  • power grid (elxeneize/Shutterstock.com)

    Electric grid protection through low-cost sensors, machine learning

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group