Google, Fedora Project, and Microsoft products had the most vulnerabilities in 2022
In today's world, where technology is embedded in every aspect of our lives, it is essential to understand the vulnerabilities present in different software and devices.
According to the data presented by the Atlas VPN team, Google, Fedora Project, and Microsoft products had the most vulnerabilities in 2022. If we look into the specific products, security researchers found the most exploits in Fedora, Android, and Windows operating systems.
More expliotabilities in a product do not necessarily mean it is less secure. Popular and open-source products tend to have more exploits due to the larger number of users discovering them.
Google products had 1372 exploits in 2022, the most of all vendors. The Android operating system had 897 vulnerabilities, which was the most of all Google products. In addition, security researchers found 283 exploits in the Chrome browser, but it did not make our top 10 list of products.
The Fedora Project was the second vendor with 945 discovered vulnerabilities. Its product Fedora Linux had the most, 944 exploits, of all products.
Security researchers discovered 939 vulnerabilities in Microsoft products in 2022. Windows 10 and 11 both had over 500 exploits, while in Windows Server OS, from 2012 to 2022, the number of vulnerabilities ranged from 414 to 553.
Debian products had 887 exploits, and their Linux OS had 884 vulnerabilities, taking 3rd place among all products. Furthermore, Apple had 456 exploits in their products, one of which, macOS, had 379 susceptabilities in 2022.
Cybersecurity writer at Atlas VPN, Vilius Kardelis, shares his thoughts on vulnerability: “As the reliance on technology continues to increase, so does the threat of cyberattacks. Individuals and organisations must remain vigilant about updating their software and taking proactive steps to protect against cyber threats.”
Severity of vulnerabilities
The Common Vulnerability Scoring System (CVSS) assesses the severity of vulnerabilities in computer systems and networks. It assigns them a numerical score based on a set of criteria such as exploitability, impact, and complexity.
Over a fifth (23%) of vulnerabilities found in Microsoft products are rated 9+. In addition, 20% of exploits are given a score of 7-8.
Apple product exploits with a score of 9+ account for 17% of all vulnerabilities. In addition, 26% of exploits are rated 6-7.
Google occupies the third spot on the list regarding severe exploits valued at 9+. They constitute 14% of all susceptabilities.
Only 2% of vulnerabilities are scored as the most severe in the Fedora Project, while those rated 6-7 make up 21% of all exploits.