While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping. Credit: Martyn Williams/IDG The total number of Microsoft vulnerabilities reported in 2021 dropped by 5%, reversing a five-year trend that saw such vulnerabilities rising sharply, according to a new report from identity management and security vendor BeyondTrust.A total of 1,212 new vulnerabilities were discovered in 2021, but their severity, as well as their location in the Microsoft family of software products, has changed substantially year over year. Vulnerabilities rated as “critical” on the CVSS standard dropped by 47% in the past year, reaching their lowest levels since BeyondTrust began issuing this report, nine years ago.Vulnerabilities on Windows, Windows Server dropWindows and Windows Server both saw sharp drops in total vulnerabilities detected, by 40% and 50%, respectively, while vulnerabilities affecting Microsoft’s Edge and Internet Explorer browsers hit a record high. Assisting in the latest analysis is Microsoft’s move to NIST’s common vulnerability scoring system, which lets researchers cross-reference security flaws more directly with bugs in the outside ecosystem. The most common type of vulnerability seen in 2021 involved privilege elevation, where an attacker gains admin rights to a system through illicit means. A total of 588 such vulnerabilities were discovered in 2021. BeyondTrust’s researchers credit a more widespread adherence to good security practices for this rise — perversely, a general decrease in users with unnecessary admin privileges helped focus bad actors’ efforts on attempts to gain elevated privileges in different ways.Attackers innovate to gain admin rights“Without easy access to users with local admin rights, attackers have started to innovate to gain elevated privileges that can then be used to compromise systems, steal credentials, and move laterally,” the report said. The second-most common type of vulnerability centered on remote code execution, which is particularly dangerous since attacks targeting such flaws can be conducted remotely, with little or no user interaction required. A total of 326 of these vulnerabilities were found in 2021, 35 of which rated a 9.0 or higher on the CVSS scale.“With this type of risk, a workable exploit is not a matter of ‘does an exploit exist,’ but rather ‘when will it be publicly available,'” said the BeyondTrust report.The report also broke out vulnerabilities in key Microsoft products, including Azure, Windows and Microsoft Office. The latter saw just one critical vulnerability, compared to a total of 66 found in 2021, while the same numbers for Azure and Dynamics 365 were seven and 44, respectively.BeyondTrust’s researchers praised Microsoft’s consistent efforts to keep Azure safe, and lauded a “steady decline” in Office vulnerabilities. Similarly, the Windows operating system itself saw a 40% drop in total vulnerabilities in 2021 compared to the previous year, with a 50% drop in critical security flaws. Related content opinion The Assumed Breach conundrum Assumed Breach is the third but often overlooked principle of zero trust. When we talk about adopting a “not if, but when” attitude to security, are we merely paying lip service or do we really believe and internalise it? By Steven Sim Apr 23, 2024 4 mins Zero Trust Security news Authentication failure blamed for Change Healthcare ransomware attack Absence of multi-factor authentication reportedly left a remote access application exposed. By John Leyden Apr 23, 2024 5 mins Ransomware Cyberattacks news Russian state-sponsored hacker used GooseEgg malware to steal Windows credentials A now-patched Windows Print Spooler flaw was used by Forest Blizzard to drop the privilege-elevating malware for credential stealing and persistence. By Shweta Sharma Apr 23, 2024 3 mins Malware Windows Security feature Top 10 physical security considerations for CISOs Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Collaboration and communication with all teams involved is the key to success. By Ericka Chickowski Apr 23, 2024 14 mins Critical Infrastructure Security Infrastructure Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe