2022年の未知の脆弱性の悪用状況をGoogleが分析。昨年は41件確認され2番目の多さ。Androidは修正リリースから実際に端末に反映されるまで時間を要すため0day要らずといえる状況に。

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022

July 27, 2023

Maddie Stone, Security Researcher, Threat Analysis Group (TAG)
This is Google’s fourth annual year-in-review of 0-days exploited in-the-wild [2021, 2020, 2019] and builds off of the mid-year 2022 review. The goal of this report is not to detail each individual exploit, but instead to analyze the exploits from the year as a whole, looking for trends, gaps, lessons learned, and successes.

Executive Summary
41 in-the-wild 0-days were detected and disclosed in 2022, the second-most ever recorded since we began tracking in mid-2014, but down from the 69 detected in 2021. Although a 40% drop might seem like a clear-cut win for improving security, the reality is more complicated. Some of our key takeaways from 2022 include:

N-days function like 0-days on Android due to long patching times. Across the Android ecosystem there were multiple cases where patches were not available to users for a significant time. Attackers didn’t need 0-day exploits and instead were able to use n-days that functioned as 0-days.

0-click exploits and new browser mitigations drive down browser 0-days. Many attackers have been moving towards 0-click rather than 1-click exploits. 0-clicks usually target components other than the browser. In addition, all major browsers also implemented new defenses that make exploiting a vulnerability more difficult and could have influenced attackers moving to other attack surfaces.

Over 40% of the 0-days discovered were variants of previously reported vulnerabilities. 17 out of the 41 in-the-wild 0-days from 2022 are variants of previously reported vulnerabilities. This continues the unpleasant trend that we’ve discussed previously in both the 2020 Year in Review report and the mid-way through 2022 report. More than 20% are variants of previous in-the-wild 0-days from 2021 and 2020.

Bug collisions are high. 2022 brought more frequent reports of attackers using the same vulnerabilities as each other, as well as security researchers reporting vulnerabilities that were later discovered to be used by attackers. When an in-the-wild 0-day targeting a popular consumer platform is found and fixed, it’s increasingly likely to be breaking another attacker’s exploit as well.

Based on our analysis of 2022 0-days we hope to see the continued focus in the following areas across the industry:

More comprehensive and timely patching to address the use of variants and n-days as 0-days.

More platforms following browsers’ lead in releasing broader mitigations to make whole classes of vulnerabilities less exploitable.

Continued growth of transparency and collaboration between vendors and security defenders to share technical details and work together to detect exploit chains that cross multiple products.

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022
第三世代のウィルス対策
Nash
DeepInstinct
webサイト脆弱性診断
セキュリティポリシー
jyrosecurity (3)
Nash (4)
DeepInstinct
previous arrowprevious arrow
next arrownext arrow
Shadow