2022 Vulnerability Stats Report
2022 Vulnerability Stats Report
Statistics Report
Table of Contents
Introduction 3
Edgescan Metrics 7
MTTR by Industry 13
MTTR by Region 14
Whitepaper Links 36
Edgescan Awards 37
Glossary 42
Compiling this report and delving into the underlying data is still a joy as it let us understand the true state of
cyber posture based on thousands of assessments and penetration tests. It gives unique insight into what’s
going on from a trends and statistics perspective and indeed a snapshot of the overall state of cyber security.
The Edgescan report has become a reliable source for truly representing the global state of cyber security
vulnerability management. This is becoming more evident as our unique dataset is now also part of other annual
security analysis reports, such as the Verizon DBIR (we are happy contributors for many years now).
This year we examined vulnerability metrics from a known vulnerability (CVE), Malware, Ransomware and
visibility standpoint (exposed services), coupling both internal and public Internet-facing systems. We also take
a look at how quick we are fixing various vulnerabilities based on risk.
We still see high rates of known (i.e. patchable) vulnerabilities, which have working exploits in the wild, used by
known nation state and cyber criminal groups.
We also decided to look at the state of cyber posture from an ASM (Attack Surface Management) standpoint.
Exposed services are a real risk. Statistically some of the exposures have a very low percentage but many of
them would result in a breach.
Remote access exposures across the attack surface are a worrying trend and accounted for 5% of total
exposures in 2021.
So yes, patching and maintenance is still a challenge, demonstrating that it is not trivial to patch production
systems. The MTTR (Mean Time to Remediation) stats also reflect on this issue. Detection on a constant basis
needs improvement and as I’ve always said, visibility is paramount. The web application layer is where the
majority of risk still resides, but some lower layer (Host/Operating system/Protocol) issues, if discovered, could
also present headaches if exploited. CVE’s as old as 2015 are being used by ransomware and malware toolkits
to exploit systems within “the perimeter“.
Attack Surface Management (Visibility) is a key driver to cyber security and based on our continuous asset
profiling, we discuss how common sensitive and critical systems are exposed to the public Internet. The
assumption here is that enterprises simply did not have the visibility or systems in place, to make them aware
of, or inform them of the exposure.
This report provides a glimpse of a global snapshot across dozens of industry verticals and how to prioritize on
what is important, as not all vulnerabilities are equal. We call out which threat actors are leveraging discovered
vulnerabilities, which should be food for thought.
This year we included a section on API security based on the assessment of thousands of API’s in 2021. We list
the Top API vulnerabilities and frequency of such.
Best Regards
Log4j:
(CVE-2021-44228 – CVSS Score: 10) A zero-day vulnerability in the Log4j Java
library, a remote code execution (RCE) flaw, has now been actively exploited in the
wild since December 2021. The vulnerability is known as Log4Shell and is now being
weaponized by botnets, including Mirai, CONTI, Konsari, and TellYouThePass groups,
currently leveraging it in their campaigns. See https://www.edgescan.com/log4shell-
quick-script/ for technical guidance. – Root cause: Remote Code Injection
Bitmart:
In December, Bitmart said a security breach permitted cyberattackers to steal circa
$150 million in cryptocurrency, with total losses including damages, to reach $200
million. Criminals stole various crypto tokens on December 4, after using a stolen
privacy key to gain access to one of BitMart’s hot wallets. – Root cause: Stolen
authentication credentials
Robinhood:
Number Of Individuals Impacted: 7 million. Robinhood disclosed a data breach
impacting five million users of the app. Email addresses, names, phone numbers,
and more were accessed via a customer support system. For the vast majority of
affected customers, the only information obtained was an email address or a full
name. For 310 people, the information taken included their name, date of birth, and
ZIP code. Of those, 10 customers had “more extensive account details revealed,”
Robinhood said in a statement. - Root cause: customer-service reps were socially
engineered into sharing information
Kaseya:
A vulnerability in a platform developed by IT services provider Kaseya was
exploited in order to hit an estimated 800 - 1500 customers, including MSPs. It is
believed that attackers carried out a supply chain ransomware attack by leveraging
a vulnerability in Kaseya’s VSA software against multiple managed service providers
(MSP) and their customers. – Root Cause: Supply chain attack
Volkswagen, Audi:
The car manufacturers disclosed a data breach impacting over 3.3 million
customers, the majority of which were based in the United States. It
occurred between August 2019 and May 2021. Audi and Volkswagen
customer data was being sold on a hacking forum after being stolen from
an exposed Azure BLOB container. – Root Cause: Exposed Database
Colonial Pipeline:
The fuel pipeline operator was struck by ransomware, via the DarkSide
cyber criminal collective. This resulted in fuel delivery disruption and panic
buying across the United States. The company paid a ransom. The
weakness was an exposed legacy VPN service, with only single-factor
authentication. – Root Cause: Exposed Remote Access Service
Facebook:
A data dump of information belonging to over 550 million Facebook users
was published online. Facebook IDs, names, dates of birth, genders,
locations, and relationship statuses were included in the logs, of which
Facebook (now known as Meta) said was collected via scraping in 2019. –
Root Cause: Unprotected personal data.
CNA Financial:
75,000 individuals impacted. CNA Financial employees were unable to
access corporate systems and were locked out following a ransomware
attack which also involved the theft of internal data. The company paid a
$40 million ransom. They were attacked via Phoenix Cryptolocker
Ransomware. - Root Cause: Exposed Remote Access Service
OneMoreLead:
Number of individuals impacted 63 Million. OneMoreLead used an exposed
database to store the personal and professional information for to at least
63 million people. – Root Cause: Exposed Database
This included over 40,000 web application and API assessments, 3 million Network Endpoint assessments and
circa 1000 penetration tests delivered in 2021 by the edgescan team.
65% of clients regularly request “Retest on-demand” to rapidly validate and close code, configuration and
patching fixes.
Clients save an average of 4 hours per application per month in time saved with this approach resulting in
more rapid mitigation.
The following is a breakdown of the risks discovered across the full stack, Web applications and Network/Hosts. It
also depicts the risks associated with potential PCI (Payment Card Industry) failures – Not every vulnerability
results in a PCI fail. Across the full stack, 20.4% of all discovered vulnerabilities in 2021 were either High or Critical
risk weaknesses. 9% of all Web Application vulnerabilities were either High or Critical Weaknesses. In the end,
16.8% of all Network/Host vulnerabilities were either High or Critical Risk.
Full Stack
Vulnerability Risk PCI Failures: 86.3%
3.6% 72.9%
15.4% 64.1% Low Medium
Low Medium
The “Full stack” includes both web application, API & Out of all vulnerabilities found on the full stack,
Network vulnerabilities discovered. We don’t believe 86.3% resulted in PCI Failures.
in silos of risk given cyber criminals don’t either.
Definition of a High Risk Vulnerability: “Exploitation of the vulnerability likely results in significant compromise
of services or data. Exploitation takes expertise in the sense that the attacker may need to be experienced.
Likelihood of exploitation is generally high
Edgescan depicts risk via the typical “Info/Low/Medium/High” risk nomenclature (similar to the OWASP Risk
Rating Methodology) and also via CVSS Score. CVSS scores may not always be accurate due to not taking the
context of a vulnerability into account.
Web Application
Vulnerability Risk PCI Failures: 59%
4.6% 4.4% 8% 7%
Critical High Critical High
Web Application Layer risks cover Web applications, Out of all vulnerabilities found on the Web
API’s, Mobile apps and systems developed by bespoke Application layer, 59% resulted in PCI Failures.
development teams. The risks are primarily due to
coding bugs. They generally have a CWE but not a CVE
as the systems are not commodity items.
Network
Vulnerability Risk PCI Failures: 68%
When we talk about “Network” risks we really mean Out of all vulnerabilities found on the Network layer,
device, servers and systems which require patching 68% resulted in PCI Failures.
or confirguration. Most issues raised have an
associated CVE or known configuration fix and are
not “developer” code related issues (even though
ultimately everything is just software!).
The measurements below include remediation and verification that the fixes are robust (including reassessments
& retesting). Mean time to Remediate (i.e. acode fix) for a critical risk on the web application/API layer is 47.6 days.
Mean time to Remediate (i.e. patch or reconfigure) a device/host layer critical risk is 61.4 days. The quickest
remediation on a vulnerability that was found was 0.5 days.
Full Stack
100
75
63.2 days 60 days
59.8 days
56.2 days Average MTTR
51.4 days
50
57.5 days
25
0
Info Low Risk Medium High Risk Critical
Informational risks are commonly risk accepted resulting in an MTTR of 51.4 days. As an industry we need to
improve the MTTR for high and critical risks.
79.4 days
75
68.4 days
61.4 days
58.3 days
50 47.6 days Average MTTR
63.8 days
25
0
Info Low Risk Medium High Risk Critical Risk
The average time to fix a Critical Risk issue, comes in at only 47.6 days, which shows that organisations are
focusing on prioritising fixing vulnerabilities in the application layer. This is overshadowed however by both the
Medium and High Risks which come in at 68.4 Days and 61.4 Days respectfully.
Device/Host Layer
100
75
65.4 days
61.4 days
59.4 days
56 days
50.7 days
50
Average MTTR
57 days
25
0
Info Low Risk Medium High Risk Critical Risk
The Device/Host layer has the lowest average MTTR of 57 days, but it also has the highest MTTR for Critical
risks of 61.4 Days.
Through the Edgescan platform, we examined ten different industries to report on their average rates
of MTTR within that industry. We can see that the shortest MTTR can be seen in Healthcare (NAICS 62)
while the longest is Public Administration (NAICS 92). The second longest MTTR is seen to be
manufacturing (NAICS 31-33) with an average of 78 days. This means that both Public Administration
and Manufacturing take approximately double the length of time compared to the Healthcare industry,
to fix vulnerabilities.
*The North American Industry Classification System (NAICS) is the standard used by Federal statistical agencies in classifying business establishments for
the purpose of collecting, analyzing, and publishing statistical data related to the U.S. business economy. - https://www.naics.com/
56
59
58
As we can see from the above figures, the North America region has the highest MTTR for companies
with an average of 59 days while Europe (EMEA) has an average of 56 days.
This gives us a global MTTR average of 57.5 Days for companies to fix their vulnerabilities.
It appears that company size generally has little or no impact in relation to the time it takes to fix
vulnerabilities, similar to the 2021 report. We measured time-to-fix for critical risk vulnerabilities for a number
of company sizes and the average is much the same across these organizations.
IT and Information Security generally does not grow linearly with the size of a business.
Larger organizations have more to secure, more data and systems, but generally not relatively more security
staff!
68
Days
61
Days
75
Days
84
Days
“If you always do what you’ve always done, you’ll always get what you’ve always got”
Henry Ford
25%
20%
15%
10%
5%
0%
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021
57%
17%
16%
Over 16% of discovered vulnerabilities are from 2016. Circa 17% of vulnerabilities are older than 5 years oldwith
57% of discovered vulnerabilities are more than 2 years old. We can see that most common CVE in 2021: CVE-
2015-4000 at 8.25% is “Logjam”while the most common CWE in 2021: CWE-310 at 21.31% is “Cryptographic
Issues”
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011
Dropbear 0.23%
SAP Internet Graphics Server Multiple XXE Vulnerabilities High Network 0.21%
OpenSSL ‘ChangeCipherSpec’ MiTM Vulnerability High Network 0.21%
Microsoft Windows Print Spooler RCE Vulnerability High Network 0.19%
(KB5005010, PrintNightmare)
jQuery End of Life (EOL) Detection Critical Network 0.19%
Microsoft Windows 7 / Server 2008 End Of Life Detection Critical Network 0.14%
OS End Of Life Detection Critical Network 0.13%
Microsoft Windows MS-NRPC Zerologon Vulnerability (CVE- Critical Network 0.11%
2020-1472) - Active Check
OpenBSD OpenSSH <= 7.9 Multiple Vulnerabilities High Network 0.11%
Server Message Block (SMB) Protocol Version 1 Enabled High Network 0.10%
SAP Message Server acl_info Configuration Vulnerability Critical Network 0.10%
SAP Gateway ACL Misconfiguration Vulnerability Critical Network 0.08%
8.1%
Authorization issues cover privilege XXE
escalation or access to restricted
functionality which would result in a data
breach. 26.7%
Cross Site Scripting
CVE-2015-4000: TLS man-in-the-middle. An Attacker can conduct a cipher-downgrade, aka the “Logjam“.
CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine
state data with key data during the initialization phase, which makes it easier for remote attackers to conduct
plaintext-recovery attacks, aka the “Bar Mitzvah” issue.
CVE-2013-2566: The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases,
which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of
ciphertext in a large number of sessions that use the same plaintext.
CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPsec protocols and other
protocols and products, have a weakness which makes it easier for remote attackers to obtain cleartext data via
a birthday attack, aka a “Sweet32” attack.
CVE-2003-0661: The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may
include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive
information.
CVE-2014-3566: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, has a weakness
that makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka
the “POODLE” issue.
1.14%
CVE-2014-3566
1.67%
CVE-2003-0661
8.25%
CVE-2015-4000
3.95%
CVE-2016-2183
4.59%
CVE-2013-2566
4.59%
CVE-2015-2808
CWE-125 1.74%
CWE-79 2.13%
CWE-119 3.16%
CWE-264 3.61%
21.31%
3.64% CWE-310
CWE-269
4.21%
CWE-20
9.42%
CWE-327
13.15%
CWE-200
10.09%
CWE-326
2.10%
2.40%
2.40%
2.50%
3.2%
Microsoft Windows Multiple Vulnerabilities
8.7%
3.7% (KB4519998): Bypass, RCE, Information
Disclosure: 8.7%
3.70% CVE-2019-0608, CVE-2019-1060, CVE-2019-1166, CVE-2019-1192,
5.0% CVE-2019-1238, CVE-2019-1307, CVE-2019-1308, CVE-2019-1311, CVE-2019-1315,
4.0% 5.0% CVE-2019-1316, CVE-2019-1317, CVE-2019-1318, CVE-2019-1319, CVE-2019-1325,
CVE-2019-1326, CVE-2019-1333, CVE-2019-1334, CVE-2019-1335, CVE-2019-1339,
CVE-2019-1341, CVE-2019-1342, CVE-2019-1343, CVE-2019-1344, CVE-2019-1345,
CVE-2019-1346, CVE-2019-1347, CVE-2019-1356, CVE-2019-1357, CVE-2019-1358,
CVE-2019-1359, CVE-2019-1365, CVE-2019-1366, CVE-2019-1367, CVE-2019-1371
CWE-125, CWE-190, CWE-787, CWE-119 CWE-269, CWE-400, CWE-434, CWE-668, CWE-79, CWE-918, CWE-434,
CWE-863, CWE-20, CWE-415
Oracle MySQL: Multiple Multiple Vulnerabilities: Security Bypass, Brocade Fabric OS: 0.9% Apache Tomcat: 4.6%
Unpatched: 4.4%
CVE-2020-15387, CVE-2016-8202, CVE-2020-15383, CVE-2021-27792,
CVE-2021-2478, CVE-2021-2479, CVE-2021-2481, CVE-2021-35546, CVE-2021-35575, CVE-2021-35577, CVE-2021-27790, CVE-2021-27794, CVE-2018-6448, CVE-2018-6449, CVE-2020-9484, CVE-2019-0232, CVE-2019-12418, CVE-2017-5647,
CVE-2021-35591, CVE-2021-35596, CVE-2021-35602, CVE-2021-35607, CVE-2021-35608, CVE-2021-35610, CVE-2019-16204 CVE-2021-25329, CVE-2016-0762, CVE-2016-5018, CVE-2016-6794,
CVE-2021-35612, CVE-2021-35622,CVE-2021-35623, CVE-2021-35625, CVE-2021-35626, CVE-2021-35627, CVE-2016-6796, CVE-2016-6797, CVE-2016-0706, CVE-2016-0714,
CVE-2021-35628, CVE-2021-35630, CVE-2021-35631, CVE-2021-35632, CVE-2021-35633, CVE-2021-35634, CWE-532, CWE-79, CWE-532, CWE-287, CWE-20, CWE-400, CWE-264, CVE-2019-17563, CVE-2018-1336, CVE-2009-3548
CVE-2021-35635, CVE-2021-35636, CVE-2021-35637, CVE-2021-35638, CVE-2021-35639, CVE-2021-35640, CWE-326
CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CWE-20, CWE-918, CWE-352, CWE-399, CWE-667, CWE-400, CWE-772,
CVE-2021-35647, CVE-2021-35648, CVE-2021-36222, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CWE-295, CWE-200, CWE-22, CWE-119, CWE-835, CWE-78, CWE-502
CVE-2020-14786, CVE-2020-14791, CVE-2020-14794, CVE-2020-14800, CVE-2020-14804, CVE-2020-14809,
CVE-2020-14814, CVE-2020-14821, CVE-2020-14828, CVE-2020-14829, CVE-2020-14830, CVE-2020-14836,
CVE-2020-14837, CVE-2020-14838, CVE-2020-14839, CVE-2020-14844, CVE-2020-14845, CVE-2020-14846,
CVE-2020-14848, CVE-2020-14852, CVE-2020-14860, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, SNMP Agent Default Community Names: 7.6%
CVE-2020-14870, CVE-2020-14873, CVE-2020-14878, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893,
CVE-2020-14539, CVE-2020-14540, CVE-2020-14547, CVE-2020-14553, CVE-2020-14559, CVE-2020-14568, CVE-1999-0517 IBM WebSphere Application Server: 1.3%
CVE-2020-14575, CVE-2020-14576, CVE-2020-14586, CVE-2020-14591, CVE-2020-14597, CVE-2020-14614,
CVE-2020-14619, CVE-2020-14620, CVE-2020-14623, CVE-2020-14624, CVE-2020-14631, CVE-2020-14632, CVE-2018-1683, CVE-2019-17566, CVE-2021-20354, CVE-2020-5258,
CVE-2020-14633, CVE-2020-14634, CVE-2020-14641, CVE-2020-14643, CVE-2020-14651, CVE-2020-14654,
CVE-2020-14656, CVE-2020-14663, CVE-2020-14678, CVE-2020-14680, CVE-2020-14697, CVE-2020-14702, SSL 64-bit Block Size Cipher Suites Supported CVE-2020-4449, CVE-2020-4576, CVE-2020-4643, CVE-2018-1840,
CVE-2021-29754, CVE-2021-29736, CVE-2020-4276, CVE-2020-4464,
CVE-2020-14725, CVE-2020-1967 (SWEET32): 29.5% CVE-2021-20353, CVE-2020-4643, CVE-2021-20492, CVE-2020-4949
CWE-327, CWE-476, CWE-189, CWE-125, CWE-200, CWE-674, CWE-787, CWE-416, CWE-190, CWE-125, CWE-787, CWE-311, CWE-20, CWE-918, CWE-22, CWE-94, CWE-200, CWE-611, CWE-668,
CWE-399, CWE-125, CWE-674, CWE-327, CWE-20, CWE-416, CWE-668, CWE-787, CWE-909, CWE-399 CVE: CVE-2016-2183
CWE-269, CWE-502
CWE: CWE-200
Apache HTTP Server Multiple QNAP NAS & QTS: 1.5% OpenBSD OpenSSH OpenSSL Multiple
Vulnerabilities: 2.2% Vulnerabilities: 6.6%
CVE-2017-0715, CVE-2021-34355, CVE-2020-2491,CVE-2020-2502, CVE-2018-0716, CVE-2018-0719, CVE-2018-0721,
CVE-2018-17199, CVE-2019-0217, CVE-2021-31618, CVE-2021-33193, CVE-2018-14746, CVE-2018-14747, CVE-2018-14748, CVE-2018-14749, CVE-2018-0714, CVE-2018-0712,
CVE-2019-10081, CVE-2019-9517, CVE-2020-11993, CVE-2020-9490, CVE-2017-13072, CVE-2021-28816, CVE-2021-34343, CVE-2019-7198, CVE-2020-25847, CVE-2020-2508, CVE-2021-28041, CVE-2019-6110, CVE-2019-6109, CVE-2018-20685,
CVE-2021-36160, CVE-2020-13950, CVE-2011-3192, CVE-2016-5387, CVE-2021-28800, CVE-2018-0711, CVE-2017-7632, CVE-2021-28798, CVE-2020-25684, CVE-2020-25685, CVE-2016-6210, CVE-2016-10012, CVE-2016-8858, CVE-2016-6515,
CVE-2016-2161, CVE-2018-8011, CVE-2017-9798, CVE-2019-10097 CVE-2020-25686, CVE-2018-19957, CVE-2017-5227, CVE-2017-6359, CVE-2017-6360, CVE-2017-6361, CVE-2016-3115, CVE-2016-1908, CVE-2015-8325, CVE-2015-6565,
CVE-2017-7418, CVE-2019-18217, CVE-2019-19269, CVE-2019-19270, CVE-2019-19271, CVE-2019-19272, CVE-2015-5600, CVE-2014-1692, CVE-2016-1907, CVE-2016-0778,
CWE-384, CWE-476, CWE-770, CWE-787, CWE-444. CWE-125, CWE-284, CVE-2020-10745, CVE-2020-9272, CVE-2020-9273, CVE-2019-7192, CVE-2019-7193, CVE-2008-5161, CVE-2008-3259, CVE-2008-1657, CVE-2016-10009,
CWE-20, CWE-399 CVE-2019-7194, CVE-2019-7195, CVE-2018-19943, CVE-2018-19949, CVE-2018-19953, CVE-2020-2490, CVE-2016-10010, CVE-2016-10011, CVE-2016-10012, CVE-2010-5298,
CVE-2020-2492, CVE-2020-2495, CVE-2020-2496, CVE-2020-2497, CVE-2020-2498, CVE-2020-36197, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221,
CVE-2021-20254, CVE-2021-28806, CVE-2020-36194 CVE-2014-0224, CVE-2014-3470, CVE-2014-8176, CVE-2015-0292,
CVE-2012-2110
PHP Multiple Vulnerabilities: 10.1% CWE-79, CWE-1286, CWE-77, CWE-78, CWE-125, CWE-284, CWE-59, CWE-610, CWE-1021, CWE-23, CWE-284,
CWE-200 CWE-119,CWE-264,CWE-320,CWE-426,CWE-78,CWE-190
CVE-2011-3379, CVE-2011-4566, CVE-2011-4885, CVE-2012-0057, CVE-2012-0781,
CVE-2012-0788, CVE-2012-0789, CVE-2019-11044, CVE-2019-11045,
CVE-2019-11046, CVE-2019-11047, CVE-2019-11050, CVE-2020-7062,
CVE-2020-7063, CVE-2020-7067, CVE-2020-8169, CVE-2021-21702, Microsoft Windows Unquoted Path Vulnerability: 2.2%
CVE-2018-19935, CVE-2011-0421, CVE-2011-0708, CVE-2011-1092, CVE-2011-1153,
CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1468, CVE-2011-1469, CVE-2009-2761, CVE-2012-4350, CVE-2013-0513, CVE-2013-1092, CVE-2013-1609, CVE-2013-1610, CVE-2013-2151,
CVE-2011-1470, CVE-2006-7243, CVE-2015-4024, CVE-2015-4025, CVE-2013-2152, CVE-2013-2176, CVE-2013-2231, CVE-2013-5011, CVE-2013-6182, CVE-2014-0759, CVE-2014-4634,
CVE-2015-4026, CVE-2015-6831, CVE-2015-6832, CVE-2015-6833, CVE-2014-5455, CVE-2014-9646, CVE-2015-0884, CVE-2015-1484, CVE-2015-2789, CVE-2015-3987, CVE-2015-4173,
CVE-2015-8867, CVE-2015-8874, CVE-2015-8879, CVE-2017-7189,
CVE-2016-4343, CVE-2017-11142, CVE-2014-0185, CVE-2016-5385,
0.9% CVE-2015-7866, CVE-2015-8156, CVE-2015-8988, CVE-2016-3161, CVE-2016-4158, CVE-2016-5793, CVE-2016-5852,
CVE-2016-6803, CVE-2016-6935, CVE-2016-7165, CVE-2016-8102, CVE-2016-8225, CVE-2016-8769, CVE-2016-9356,
CVE-2016-6128, CVE-2016-10158, CVE-2016-10161, CVE-2015-8874, 1.0% CVE-2017-1000475, CVE-2017-12730, CVE-2017-14019, CVE-2017-14030, CVE-2017-15383, CVE-2017-3005,
CVE-2015-8877, CVE-2015-8879, CVE-2014-9425, CVE-2014-9709, 1.0% CVE-2017-3751, CVE-2017-3756, CVE-2017-3757, CVE-2017-5873, CVE-2017-6005, CVE-2017-7180, CVE-2017-9247,
CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2017-9644, CVE-2018-0594, CVE-2018-0595, CVE-2018-2406, CVE-2018-5470, CVE-2018-6016, CVE-2018-6321,
CVE-2014-3487, CVE-2014-3515, CVE-2015-6831, CVE-2015-6832, 1.3% CVE-2018-6384
CVE-2015-6833, CVE-2016-5094, CVE-2016-5095, CVE-2016-5096,
CVE-2013-7456, CVE-2016-5093, CVE-2018-19395, CVE-2018-19396, 1.5% CWE-22, CWE-254, CWE-264, CWE-284, CWE-399, CWE-426, CWE-428, CWE-77
CVE-2018-19518, CVE-2018-20783, CVE-2017-11144, CVE-2017-11145,
CVE-2017-11146, CVE-2017-11628, CVE-2017-7890, CVE-2020-22278,
CVE-2020-10802, CVE-2020-10803, CVE-2020-10804, CVE-2021-23840 2.0%
CWE-1236, CWE-79, CWE-89, CWE-77, CWE-416,CWE-502, CWE-20, CWE-125, 2.2%
CWE-189, CWE-119, CWE-476, CWE-79, CWE-835, CWE-200, CWE-264, CWE-88,
CWE-119, CWE-200, CWE-754, CWE-502, CWE-190, CWE-399, CWE-94 2.2%
2.3%
2.9% 29.5%
2.9%
3.1%
3.9%
4.4%
10.1%
4.6%
5.3%
6.6% 7.6%
CWE-20, CWE-200, CWE-22, CWE-269, CWE-346, CWE-416, CWE-425, CWE-59, CWE-665, CWE-787, CWE-863, CWE-908, CWE-125, CWE-20, CWE-200, CWE-787
Edgescan clients with appropriate privileges can risk-accept vulnerabilities in the platform. A Risk-accepted
issue puts a discovered vulnerability in a “non-closed” state so it can be tracked but it is not deemed a risk by
the organization. The below table shows a list of the most common vulnerability types that our clients tend to
accept the risk posed by them.
5.71% 31.79%
Apache HTTP Server
Oracle Mysql Security
6.07%
HPE Integrated Lights-Out
12.50%
Cookie without HttpOnly Flag
22.14%
SSl Cookie
This provides a snapshot view of the health of assets in general, both public internet facing and internal hosts
combined. The % of Assets with more than ten CVE’s has increased significantly from the 2021 report (up from
4%). There is a marked increase of systems with at least one CVE (43% in 2021 report).
The density of known vulnerabilities within a single system, can really say something about an organisation. For
the 5% of systems with more than ten CVE’s, the presence of such can often be a sign to an attacker that an
organisation does not have adequate security resources or perhaps they are running a large number of legacy
systems. Legacy systems, those which cannot be patched due to various reasons, should be further protected.
Organisations that hold a large number of systems which are in this 5% are susceptible to malware proliferation,
should a malware attack take hold.
In particular Remote Access, Database and Network Management protocols should not be exposed and are also
commonly used by ransomware gangs to breach an organization.
Remote Desktop Protocol (RDP) credentials can be found on the dark web, with some selling as cheaply as $20
each.
“Remote access exposures across the attack surface are a worrying trend and
accounted for 5% of total attack surface exposures in 2021. ”
Description Notes
Secure Shell (SSH) With SSH providing long term privileged access, this is not only a top targeted service for entry, but a larger
priority of REENTRY, SSH versions may be secure but the credential attacks are always a top priority, if this
fails and secure keys are in place it does not remove the risk of being a long term re-entry to the system, as
well as pivoting to additional systems with static SSH keys been a common issue.
Simple Mail Transfer Protocol SMTP being internet facing exposed leads to a serious issue - there may be no mechanisms implemented to
(SMTP) stop unauthorized access, or protection such as a SPF in place to prevent Open Relay attacks leading to both
spam and phishing, or malware. This can also be used as a form of DoS attacks by flooding servers.
RDP (Windows) RDP is greatly misunderstood as not being a significant risk if exposed to the internet. This could not be
more incorrect - RDP servers can suffer from poorly implemented security, such as not having rate-limiting
or failed login limits. This exposes the server to become an entry point into private networks. RDP should be
protected further by implanting an additional layer of security, such as a VPN.
Simple Network Management SNMP should be also have a firewall rule to block UDP:161, UDP:162 - SNMP can be misunderstood as secure
Protocol (SNMP) as no vulnerability may exist - but this is overlooking the fact that SNMP is inherently an insecure protocol
that was designed predating what we know as security today. It is unencrypted and provides very useful
management advantages, however these can also be abused by a malicious user.
H.323 (Microsoft NetMeeting) This is common when VOIP is being used. Misconfigured H.323 can result in VOIP system breach and access
call setup protocol to internal numbers resulting in potential evesdropping.
Windows AD/SMB There is no practical reason for SMB to be exposed to the internet, and inbound traffic should be blocked.
Unlike other less complicated/limited sandboxed protocols, SMB is deeply integrated to the OS and will
continue to be a top 5 attack which we have experienced with EternalBlue, WannaCry, NotPetya
Berkeley rshd Remote Access
FTP FTP is one of the big 5, with it being an unecrypted protocol. It is one of the top 5 ports checked for by BOTs
along with SFTP. An exposed FTP service often tells hackers “They cant even set up SFTP and so must have
little security experience”
MySQL Exposed Database: These may and usually contain data, which is a big priority to organisations, their clients
and therefore to attackers. Databases are invaluable assets to attack and will always be a high priority target
if found. Exposed databases are often misunderstood to be secure due to password protection or being
fully patched. However, this is often not the case and databases are highly susceptible to credential brute-
force attacks and other authentication based attacks.
SIP (IoT) VOIP
PostGreSQL Exposed Database
Microsoft PPTP VPN Remote Access
MS SQL Exposed Database
Telnet With telnet being one of the earliest remote login protocols it is also important to note that in the early days
these protocols were built with the purpose to perform high privilege tasks. Cleartext packet sniffing and
credential attacks are still widely used against this protocol.
rlogin, rsh, rexec Remote Access
MS SQL Exposed Database
rlogin, rsh, rexec Remote Access
Pervasive SQL Exposed Database
Pervasive SQL Exposed Database
Interbase DB Exposed Database
In general we see that organizations struggle with visibility of their own IT estates, knowing what is running and
where, at any given time. This can and likely has lead to many security breaches, some of which were hot topics
during the year.
Attack Surface Management (ASM) is a trending solution, something Edgescan has delivered since 2016 and can
provide continuous visibility across an enterprise estate, helping to detect exposures and vulnerabilities as they
occur. ASM scanning can occur from multiple geographic locations in order to circumvent geo-locked source IP
scans.
2,000,000
Based on sample IP’s during 2021
1,679 1,815
Telnet Microsoft PPTP VPN
5,609 983
MySQL Databases Oracle Databases
Exposed Data
135
Exposed Backup Directories/Files
“I fear not the man who has practiced 10,000 kicks once, but I fear the man who has
practiced one kick 10,000 times”
Bruce Lee
Application Security
• Continuous Application/API vulnerability
assessment
• Pentesting as a Service (PTaaS)
• API Security assessment and Pentesting
AWARDS
• Alerting and integration
SCREENSHOTS
REVIEWS
Host Security
•LINKS
Continuous External /Internal Vulnerability
Assessment
• Fullstack coverage
SALES DEC/DIFFERENTIABLE DEFFERENTIATORS
• Pentesting as a Service (PTaaS)
GLOSSARY
• Alerting and integration • Validated by experts
Continuous Monitoring
• Live system and service 24/7 discovery
• Mitigation Support
• Alerting and integration
• Exposed service alerting • On-demand
API Discovery
• Continuous API discovery and enumeration
• Eliminate blind spots
40%
Reduce Mean Time To
2.1+
Save on average the equivalent
of 2.1 full time staff members
Remediation (MTTR) by 40%
per month using Edgescan
If you think Edgescan can help your organisation increase its security posture,
get in touch with our sales team for a trial at sales@edgescan.com
100%
Full OWASP Application Security
24/7/365
Continuous asset profiling and discovery
Coverage
Centralized Dashboard
Get all your information in one location with an
interactive & exportable risk metrics dashboard
Assets
Keep track of all assets and perform
assessments on-demand for a holistic
management of assets across your organization
Vulnerabilities
Receive actionable risk intelligence with the
ability to rescan on-demand to ensure that
your hosts and asset vulnerabilities are fixed
Hosts
Always know what’s going on with our 24/7/365
visibility of your external exposures that have
been added to the platform, allowing you to
know exactly what is going on at any given time
Reporting
The Edgescan platform has an extensive
reporting system that allows you to
generate a report on any page that you are on
“Any time the security team had to onboard a new penetration testing provider, it would typically take two
members of staff an entire week to collate all the necessary information. With Edgescan, this can be done in
seconds. Being a charity with a small security team, this is a huge advantage for the business as whole! The
scalability of Edgescan’s solution is another advantage – should the Department of Health assign more systems
to Skills for Care to use, Edgescan can integrate them immediately and seamlessly into their platform. “
Immedis
After following a robust procurement process, the Edgescan bid came out on top for its simplicity of use and
broad coverage as well as the willingness to provide a proof of value. The exercise confirmed that Edgescan’s
claims on having a solution that is virtually free of false positives were not just a sales pitch. The human valida-
tion component of the Edgescan SaaS guaranteed Immedis that every single alert was an issue worth investiga-
tion.
“It wouldn’t be a hyperbole to call them unsung heroes. What they do is excellent, and their product deserves
all the praise it receives.” - David Quirke, CISO, Immedis.
CX Index
Skills for Care
Continuous vulnerability assessments have made it a lot easier for us to identify gaps or concerns in the
The main return on investment Skills for Care noticed following the commencement of the Edgescan SaaS, was
security posture of our product offering. The amount of detail provided when a vulnerability is detected makes
the time resource saved.
it easy for us to address them quickly. Plus, we can sleep more easily in the knowledge that we are doing our
utmost to ensure the data of our customers and their customers is protected!
Any time the security team had to onboard a new penetration testing provider, it would typically take two
members of staff an entire week to collate all the necessary information. With Edgescan, this can be done in
“Seamless deployment and unparalleled customer service: how Edgescan helped CX Index up their vulnerability
seconds. Being a charity with a small security team, this is a huge advantage for the business as whole! The
management game” David Heneghan, CEO and Co-founder of CX Index
scalability of Edgescan’s solution is another advantage – should the Department of Health assign more systems
to Skills for Care to use, Edgescan can integrate them immediately and seamlessly into their platform.
Archroma
Immedis
Edgescan gives us the peace of mind that comes with knowing that our vulnerability management solution is
After following a robust procurement process, the Edgescan bid came out on top for its simplicity of use and
virtually false-positive free. The accuracy that comes with human validation, paired with the efficiency of
broad coverage as well as the willingness to provide a proof of value. The exercise confirmed that Edgescan’s
automatic continuous scanning, means that my team now knows that whenever a vulnerability is flagged, the
claims on having a solution that is virtually free of false positives were not just a sales pitch. The human valida-
vulnerability is there, and they can continue working until they find it and fix it.
tion component of the Edgescan SaaS guaranteed Immedis that every single alert was an issue worth investiga-
tion.
“It wouldn’t be a hyperbole to call them unsung heroes. What they do is excellent, and their product deserves all
the praise it receives.” - David Quirke, CISO, Immedis.
2022Vulnerability
2022 VulnerabilityStatistics
StatisticsReport
Report 33
41
Glossary
Edgescan Information
Asset - a web application, an IP network range, mobile application, API, microservice or a CI/CD pipeline
API - Application Programming Interface
CI/CD - Continuous Integration / Continuous Deployment
CVE - Common Vulnerabilities and Exposures
CVSS - Common Vulnerability Scoring System
CWE - Common Weakness Enumeration
AWARDS
DNS - Domain Name System
SCREENSHOTS
DOM - Document Object Model
REVIEWS
External - Public Internet Facing
LINKS
FTP - File Transfer Protocol
SALES DEC/DIFFERENTIABLE DEFFERENTIATORS
Internal - Non-Public Internet Facing
GLOSSARY
MTTR - Mean Time To Respond/Remediate
PCI - Payment Card Industry
PTaaS - Penetration Testing as a Service
RCE - Remote Code Execution
RDP - Remote Desktop Protocol
SNMP - Simple Network Management Protocol
SMTP - Simple Mail Transfer Protocol
SME - Small and Medium Enterprises
SSH - Secure Shell
SSO - Single Sign-On
XML - eXtensible Markup Language
XSS - Cross-Site Scripting
2022
2022 Vulnerability
Vulnerability Statistics
Statistics Report 2 42
Report
Edgescan Information
AWARDS
SCREENSHOTS
REVIEWS
LINKS
SALES DEC/DIFFERENTIABLE DEFFERENTIATORS
GLOSSARY
@edgescan
@edgescan
Contributor
Verizon 2019
Data Breach
Investigations Report
2022
2022 Vulnerability
Vulnerability Statistics
Statistics Report 2 43
Report