The Laws of Vulnerabilities 2.0

As an on demand vulnerability management solution, Qualys has the unique ability to collect and analyze aggregate vulnerability data from thousands of real world networks, providing its customers information unavailable anywhere else.

Based on this statistically representative sample of Internet vulnerabilities, Qualys has presented and published leading vulnerability research including the well-known "Laws of Vulnerabilities". The Laws 2.0 reveals vulnerability half-life, prevalence, persistence and exploitation trends for five critical industry segments including Finance, Healthcare, Retail, Manufacturing and Services. These trends were drawn from a statistical analysis of more than 680 million vulnerabilities out of which 72 million vulnerabilities are critical, generated by 80 million scans during 2008.

The Laws of Vulnerabilities 2.0 Declarations

Half-Life: The half-life of critical vulnerabilities remained at 30 days across all industries. Comparing individual industries, the Service industry has the shortest half-life of 21 days, Finance ranked second with 23 days, Retail ranked third with 24 days and Manufacturing ranked last with a vulnerability half-life of 51 days.

Prevalence: Sixty percent of the most prevalent and critical vulnerabilities are being replaced by new vulnerabilities on an annual basis. This number has increased from the 2004 research where it was 50 percent. The top stragglers according to Laws 2.0 are MSFT Office, Windows 2003 SP2, Adobe Acrobat and Sun Java Plug-in.

Persistence: The Laws 2.0 declared that the lifespan of most, if not all vulnerabilities is unlimited and a large percentage of vulnerabilities are never fully fixed. This law was illustrated with data samples from MS08-001, MS08-007, MS08-015 and MS08-021.

Exploitation: Eighty percent of vulnerability exploits are now available within single digit days after the vulnerability's public release. In 2008, Qualys Labs logged 56 vulnerabilities with zero-day exploits, including the RPC vulnerability that produced Conficker. In 2009, the first vulnerability released by Microsoft, MS09-001 had an exploit available within seven days. Microsoft's April Patch Tuesday included known exploits for over 47 percent of the published vulnerabilities. This law had the most drastic change from the Laws 1.0 in 2004, which provided a comfortable 60 days as guidance.

Laws of Vulnerabilities Research Methodology

The Laws is derived from an anonymous dataset that is not traceable to any given customer, IP address or network. The data is collected through the Qualys scanning infrastructure that performs over 1 billion IP audits annually. Simple counters are kept during scanning of customers' networks and the collected data is then summarized and logged daily for this research analysis.

Qualys Solutions
Qualys Community
Free Trial & Tools
Free Trial

Nothing to install!

1 (800) 745 4355