VMware Explore Is on the Horizon
VMware Explore Is on the Horizon

Set your sights higher. 4 days. Hundreds of sessions. Endless ideas.

News Releases3 min read

Bit9 Research Shows Java is Most Targeted Endpoint Technology for Cyber Attacks; Widely Deployed Older Versions Pose Greatest Risk

Years of Java Updates have not Improved Security Vulnerabilities

WALTHAM, Mass.—July 18, 2013—A new research report published today by Bit9, the leader in next-generation endpoint and server security, finds that Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks.

The Bit9 threat research team analyzed Java deployment statistics on approximately 1 million endpoints at hundreds of enterprises worldwide. Java Vulnerabilities: Write Once, Pwn Anywhere, identifies significant risks posed by outdated versions of Java with many known vulnerabilities that remain widely deployed by many businesses. Highlights include:

  • The average organization has more than 50 versions of Java installed across all of its endpoints.
  • Five percent of those enterprises have more than 100 versions of Java installed.
  • Most endpoints have multiple versions of Java installed, in part because the Java installation and update process often does not remove old versions.
  • Attackers can determine what versions of Java an enterprise is running and target the oldest, most vulnerable versions.
  • The most popular version of Java running on endpoints analyzed by Bit9 is version 6 update 20, which is present on 9 percent of all systems and has 96 known vulnerabilities of the highest severity.
  • Fewer than 1 percent of enterprises are running the latest version of Java.

Click here to watch a video with Bit9 CTO Harry Sverdlove discussing the Java problem.

“For the past 15 years or so, IT administrators have been under the misperception that updating Java would address its security issues,” said Harry Sverdlove, Bit9 chief technology officer. “They have been told that to improve security, they should continuously and aggressively deploy Java updates on all of their endpoints. Unfortunately, updating is not the same as upgrading. Until very recently, those updates have failed to deliver the promised security upgrade because they have not removed older, highly vulnerable versions of Java they were intended to replace. As a result, most organizations have multiple versions of Java on their endpoints, including some that were released at the same time as Windows 95,” said Sverdlove.

Bit9’s research also discovered that it is fairly easy for attackers to target older versions of Java without the enterprise even realizing it. Eighty-two percent of the endpoints analyzed by Bit9 are running the version 6 series of Java, which has the most known reported vulnerabilities.

Java Vulnerabilities: Write Once, Pwn Anywhere recommends that enterprises concerned about the security risks in older versions of Java should:

  • Assess how many versions of Java are running in the enterprise
  • Decide if these older versions are needed for valid business reasons and if Java should be running in browsers
  • Enforce those decisions with a comprehensive security solution

“It’s not surprising that most companies are unaware of all the versions of Java on their systems,” said Sverdlove. “Most organizations have no idea what’s running on their endpoints and servers—they lack visibility into those systems. And traditional security solutions—including antivirus—can’t protect them from modern threats. At Bit9 we focus on providing real-time visibility and protection for endpoints and servers to address this critical need.”

About Bit9
The Bit9 Security Platform is the only next-generation endpoint and server security solution that continuously monitors and records all activity on endpoints and servers and stops cyber threats that evade traditional security defenses. Bit9’s real-time sensor and recorder, real-time enforcement engine, and cloud-based services provide the most reliable form of endpoint and server security and deliver value within days of implementation. This combination gives organizations immediate visibility to everything running on their endpoints and servers; real-time signature-less detection of and protection against advanced threats; and a recorded history of all endpoint and server activity for deep forensics. Security teams use Bit9’s integration with network security devices such as FireEye and Palo Alto Networks to accelerate incident response and ensure all files arriving on endpoints and servers are safe. Bit9 has stopped the most advanced attacks, including Flame, Gauss, and the malware responsible for the RSA breach. One thousand organizations worldwide—from 25 Fortune 100 companies to small businesses—use Bit9 to increase security, reduce operational costs, and improve compliance.