No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

The Problem of Old Vulnerabilities — and What to Do About It

May 9, 2023
in Protection
0
The Problem of Old Vulnerabilities — and What to Do About It



As a general rule, IT departments are focused on the next threat: the zero-day vulnerabilities lurking in the system, the trapdoors hidden from view. This is understandable. We fear the unknown, and zero-day vulnerabilities are unknown by definition. The mind inevitably leaps ahead to the untold damage they might cause if and when attackers finally identify them.

But this focus on the next threat, the unknown risk, might be harming the organization. Because as it turns out, most of the vulnerabilities businesses should be worrying about have already been identified.

According to a recent report from Securin, the vast majority — 76% — of vulnerabilities exploited by ransomware in 2022 were old, discovered between 2010 and 2019. Of the 56 vulnerabilities tied to ransomware in 2022, 20 of them were old vulnerabilities discovered between 2015 and 2019.

In other words: At a time when ransomware attacks are perhaps the biggest threat facing organizations, the vulnerabilities most often exploited by ransomware attackers are already known to us. And yet countless companies have left themselves open to them.

IT departments can’t entirely be blamed for this persistent problem — most are overworked, overstretched, and engaged in triage with a never-ending cascade of threats from every direction. Still, proper cybersecurity hygiene mandates that IT teams take these old vulnerabilities seriously and factor them into their everyday security processes.

Why Old Vulnerabilities Are Neglected

Before examining how exactly companies can get more vigilant about old vulnerabilities, let’s drill deeper into the problem as it exists today.

To begin with, it’s worth noting that this isn’t an abstract concern. Just earlier this year, it was revealed that multiple threat actors had exploited a 3-year-old vulnerability in Progress Telerik to breach a part of the US government. “Exploitation of this vulnerability allowed malicious actors to successfully execute remote code on a federal civilian executive branch (FCEB) agency’s Microsoft Internet Information Services (IIS) web server,” the affected agencies said.

Part of the problem here boils down to the life cycle of a given vulnerability. When a vulnerability is first identified — when a zero-day vulnerability is born — everyone pays attention. The vendor issues and deploys a patch, and some percentage of affected IT teams tests and install it. Of course, not every affected IT team gets around to it — they might think it’s not a priority, or it might just slip through the cracks of their process.

Months or years pass, and the zero-day vulnerability becomes just another one of hundreds of old vulnerabilities. High turnover in IT departments means new arrivals might not even be aware of the old vulnerability. If they are aware of it, they might assume it’s already been taken care of. In any case, they have other things to worry about — including but not remotely limited to all the new zero-day vulnerabilities being identified on a regular basis.

And so the old vulnerability lives on in the network, just waiting to be rediscovered by a savvy attacker.

Working Proactively to Patch Old Vulnerabilities

Given all of that, there’s no question that businesses need to be more vigilant about old vulnerabilities. Granted, keeping one eye on the past and one eye on the future isn’t easy, especially not when IT departments have so much else to worry about. And it’s true that IT departments can’t expect to patch everything. But there are fairly simple approaches that can minimize the risk of an old vulnerability coming back to haunt an unprepared organization.

The simplest and most effective approach involves getting optimized patch management processes in place. That means achieving a comprehensive view of your attack surface — including old vulnerabilities — and making conscious judgments about the best way to allocate your IT team’s resources.

These judgments should be informed by standard vulnerability repositories like the National Vulnerability Database (NVB) and MITRE. But they should also go beyond them. The fact is that the vulnerability repositories most often consulted by IT departments contain glaring holes, and these unfortunate omissions play a definite role in the continued exploitation of old vulnerabilities by bad actors. And that’s not to mention the fact that many standard risk calculators tend to underestimate risk.

The simple fact is that organizations cannot properly evaluate the threats they’re facing if they’re working off of impartial or improperly weighted information — they need to know the precise risks they’re facing, and they need to be able to properly prioritize those risks.

At the end of the day, a vulnerability is a vulnerability, whether it was identified five years ago or five hours ago. The age of a vulnerability is irrelevant if and when it’s exploited — it’s capable of leading to just as much damage. But for IT teams, old vulnerabilities do possess one distinct advantage: we already know about them. Putting that knowledge to use — working proactively to identify and patch those vulnerabilities — is essential to keeping today’s organizations secure.

Editorial Team

Editorial Team

Related Posts

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘A Knight of the Seven Kingdoms'
Protection

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘A Knight of the Seven Kingdoms’

April 22, 2026
How to Spot AI Audiobooks on Libby
Protection

How to Spot AI Audiobooks on Libby

April 21, 2026
The Best Last-Minute Deals From Home Depot's 'Spring Black Friday' Sale
Protection

The Best Last-Minute Deals From Home Depot’s ‘Spring Black Friday’ Sale

April 21, 2026
10 Hacks Every Apple CarPlay User Should Know
Protection

10 Hacks Every Apple CarPlay User Should Know

April 21, 2026
The Samsung Galaxy Watch Ultra Is Over $100 Off Right Now
Protection

The Samsung Galaxy Watch Ultra Is Over $100 Off Right Now

April 21, 2026
11 of the Biggest Moments in Tim Cook's Time As Apple CEO
Protection

11 of the Biggest Moments in Tim Cook’s Time As Apple CEO

April 21, 2026
Load More
Next Post
PayPal, IBM turn to AI to cut costs

PayPal, IBM turn to AI to cut costs

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Chainalysis: Crypto Money Laundering Surged to $82 Billion in 2025

    0 shares
    Share 0 Tweet 0
  • What It Could Mean For XRP

    0 shares
    Share 0 Tweet 0
  • Contrary To Popular Belief, This Is Not The Worst Bitcoin Crash In History – Here’s The List

    0 shares
    Share 0 Tweet 0
  • Strait of Hormuz tensions keep WTI crude oil market on edge as April deadline nears

    0 shares
    Share 0 Tweet 0

Latest News

DoorDash Stablecoin Payments Move Could Expand Mainstream Crypto Checkout

DoorDash Stablecoin Payments Move Could Expand Mainstream Crypto Checkout

April 22, 2026
0

DoorDash announced on April 21, 2026, that it is integrating stablecoin crypto payment infrastructure through Tempo – a layer-1 blockchain...

Stocks making the biggest moves after hours: ADBE, UAL, COF

Stocks making the biggest moves after hours: ADBE, UAL, COF

April 22, 2026
0

Check out the companies making headlines after the bell : United Airlines — Shares rose about 1% even after the...

Senior Associate Director, Executive MBA Career Advisor & Programming Lead

Senior Associate Director, Executive MBA Career Advisor & Programming Lead

April 22, 2026
0

Senior Associate Director, Executive MBA Career Advisor & Programming LeadUniversity OverviewThe University of Pennsylvania, the largest private employer in Philadelphia,...

Wendel and BNPP AM Alts Prime take stakes in Committed Advisors

Wendel and BNPP AM Alts Prime unit acquire stakes in Committed Advisors

April 22, 2026
0

Listed investment firm Wendel has completed its acquisition of a controlling stake in Committed Advisors, with BNP Paribas Asset Management...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.