Reports

ICS-CERT annual vulnerability coordination report 2015, +74% flaws

The US ICS-CERT published its annual vulnerability coordination report for FY 2015 that provided information about security holes reported to the agency.

The US ICS-CERT has published its annual vulnerability coordination report for the fiscal year 2015. The report included detailed information about security vulnerabilities reported to the US ICS-CERT in 2015.

“ICS-CERT is pleased to announce the release of the NCCIC/ICS-CERT FY 2015 Annual Vulnerability Coordination Report. This report provides a summary of the DHS NCCIC/ICS-CERT vulnerability coordination activities for FY 2015. A link to the full document can be found on the ICS-CERT web site ICS-CERT Info Products web page.” reported the ICS-CERT.

According to the annual vulnerability coordination report, the overall number of security flaws disclosed by the US ICS-CERT is 427,  meanwhile, in 2014 the number of vulnerabilities was 245.

This means that the number of flaws disclosed by the US ICS-CERT has increased by 74 percent.

According to ICS-CERT, 52 percent of vulnerabilities reported to the agency in the FY 2015 are related to improper input validation and poor access controls.

Experts reported an alarming trend related to the increase in reported cryptographic flaws respect past reports.

A close look at the type of flaws discovered in 2015 revealed that permissions, privileges and access control accounted for 27%, improper input validation for 25%, credentials management for 19%, improper control of a resource for 12%, cryptography for 11% and poor quality code for 6%.

Last year the ICS-CERT published 197 advisories and 16 alerts, the report highlights a significant increase in the percentage of vulnerabilities coordinated with ICS-CERT giving the time to the vendor to address the flaw.

The number of flaws coordinated with the US ICS-CERT passed from 80 percent in 2014 to 93 percent in 2015.

According to the annual vulnerability coordination report published by the US ICS-CERT, 43 percent of the security vulnerabilities reported in 2015 been rated high severity. In 2014, more than 70 percent of the flaws were rated as high severity. The analysis of the CVSS scores confirmed that they have decreased over the past years, from 8.55 in 2010 to 6.85 in 2015.

The report reveals that most affected industry is the energy sector, it accounts for more than 800 vulnerabilities reported since 2011. The second place is for critical manufacturing, with over 700 flaws, followed by the water and wastewater systems sector with more than 600 vulnerabilities.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – annual vulnerability coordination report, ICS-CERT)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

8 hours ago

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

15 hours ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

19 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

20 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

24 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

1 day ago