Web app security patches: Closing the risk window

Step 2: Keep your drivers and patches up-to-date

Like many things, there's both good news and bad news to be delivered here. The good news is that vendors are now patching vulnerabilities much faster than they were a year ago, according to research from the High-Tech Bridge Security Research Lab.

Indeed, average patch times have been reduced by one third. The not so good news, however, is the same study reveals it is still taking vendors an average of 11 days to fix 'critical' security vulnerabilities, 12 days for 'high risk' and 13 days for 'medium risk' ones.Those vulnerabilities that fall into the low risk category, but are still a risk nonetheless, take an average of 35 days to patch.

The researchers found that, despite the introduction of better coding practices which make uncovering serious vulnerabilities in mature apps much harder, decent enough application security was being compromised by basic mistakes and previously so-called 'unexploitable' vulnerabilities were being compromised by new DNS exfiltration techniques.

During the course of 2013, the High-Tech Bridge Security Research Lab released a total of 62 security advisories which detailed a total of 126 vulnerabilities, impacting mainly well-known web applications. Such a volume of issues has the potential to hit several million live websites.

IT Pro spoke to Ilia Kolochenko, CEO of High-Tech Bridge, about his companies research. "It's important to distinguish between different types of software products. At High-Tech Bridge we saw open-source products, entirely supported and developed by a community of enthusiasts, who patched serious security vulnerabilities in their products within a few hours overnight," he says.

However, he admits that the company also saw huge commercial firms who bill their end-users for security, and who didn't even bother to reply within a week. "Another important point to mention is the different levels of complexity in vulnerabilities" Kolochenko says "some vulnerabilities (e.g. XSS) can take half-an-hour to patch, others (e.g. XSRF of Authentication Bypass) may take several days for a large application." Which means that it's not always possible to compare the absolute time to patch, and every project will have its own priorities and goals.

That didn't stop Kolochenko telling IT Pro he considers it "unethical when commercial products don't really care about the security of their customers." Kolochenko insists that some SMBs or open source projects were more competent in patch-development than their international competitors with offices in several countries.

"For me, the biggest question is not even the average time of patch, but the percentage of effort, time and attention the vendor devotes to the security of his product," he concludes.

Davey Winder

Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.

Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.

You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.