Java Vulnerabilities Persist Despite Warnings

LOS ANGELES — Internet security experts have long advised computer users to use an anti-virus solution and to keep their software updated, but too often it seems that a lack of concern over these calls is leading to problems for businesses and consumers alike.

A recent whitepaper by trust-based security firm Bit9, entitled, “Java Vulnerabilities Report: Write Once, Pwn Anywhere,” is casting new light on the ongoing threats to the most widely deployed software ever.

Explaining that Java was originally released with the slogan “write once, run anywhere,” the report notes that the popularity of this technology underscore its cross-platform capabilities.

“Over time, Java has become ubiquitous on endpoints, so ‘run anywhere’ can be interpreted as referring to its ubiquity. Even as fewer websites and web applications require Java in order to operate properly, the technology is pervasive on virtually every end-user system,” the Bit9 report states. “For a variety of reasons, Java also has become a platform that is highly vulnerable to attack.”

The report notes that Java’s ubiquity and vulnerabilities have made it the technology most frequently exploited by cyber attackers, prompting Bit9 to take a closer look at the reasons behind this problem, incorporating data from many organizations.

The results of this initiative are both “surprising and concerning” to Bit9 which not only found that Java has become the most targeted endpoint technology, but that less than one percent of companies are running the latest version of Java.

The report also explains that most endpoints have multiple versions of Java installed, partly because the Java installation and update process does not remove the old versions, leading attackers to typically target old, vulnerable versions installed on the computer or other device.

“The solution is that organizations need to take a serious look at their use of Java,” Bit9 CTO Harry Sverdlove told eWEEK. “This is not just one of a million things that organizations can do to improve their security posture — this is the most attacked vector. They need to seriously consider what their policy is and where Java is deployed in their environment.”

Calling 2012 “The year of Java vulnerabilities,” a Kaspersky Security Bulletin names Oracle’s Java as being the most frequently exploited software by cybercriminals in 2012, with Java security holes responsible for half of all attacks. Contrast this figure to that of Microsoft’s Windows components and Internet Explorer browser, long called vulnerable, which were exploited in only three percent of incidents.

Kaspersky explains that exploit packs (malicious programs that attempt to infect a computer utilizing various vulnerabilities in popular software) are the main tool behind web-based attacks.

“Exploiting vulnerabilities is one of the primary methods used by cybercriminals to install malware on victims’ computers,” the Kaspersky Bulletin notes. “Cybercriminals exploit applications or software that have un-patched security vulnerabilities, which exist because either the individual or business have failed to patch their vulnerable applications with the latest security updates from vendors.”

According to Oracle’s Java software development lead Nandini Ramani, the company is working diligently to respond to the rise in reports of security vulnerabilities in Java, especially those that affect web browsers running Java, with a number of enhancements to the default security profile, while providing more control over security for end users.

“It is our belief that as a result of this ongoing security effort, we will decrease the exploitability and severity of potential Java vulnerabilities in the desktop environment and provide additional security protections for Java operating in the server environment,” Ramani said.

“The fact that a majority of observed environments apparently use significantly out-of-date versions of Java points to potential issues in how well the average organization manages its software as well as the large attack surface area presented by Java in the majority of organizations,” the Bit9 report concludes.

An infographic on Java based security threats is available for download here.

Related:  

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

Paysite Confidential: Inside the Creator Economy's Shift Toward Ownership

For years, the adult industry’s creator economy has been defined by platforms — powerful engines of discovery, monetization and scale that reshaped how performers connect with their audiences.

Senator Urges DOJ to Crack Down on 'Obscenity,' Attacks OnlyFans

U.S. Senator Jim Banks of Indiana this week urged Acting Attorney General Todd Blanche to reestablish the Department of Justice’s defunct Obscenity Prosecution Task Force in a letter that targets OnlyFans while repeatedly conflating “obscenity” with legal adult content.

UN Experts Urge US, Canada to Prosecute Aylo, Others for 'Exploitation'

GENEVA – The United Nations Office of the High Commissioner for Human Rights (OHCHR) has issued a press release in which two U.N. special rapporteurs, cited as experts, accuse Aylo and other companies of complicity in sexual exploitation.

Kickstarter Revokes New Rules Banning Fundraising for Adult Content, Products

Crowdfunding platform Kickstarter announced Tuesday that it has reversed its recent decision to impose new “Mature Content” rules banning projects that involve adult content and sextech.

Report: Irish Justice Minister Seeks UK-Style Ban on 'Extreme' Content

Ireland’s justice minister plans to introduce legislation criminalizing possession and distribution of “extreme” pornography, according to a report by the Irish Independent.

New Kickstarter Rules Ban Fundraising for Adult Content, Products

Crowdfunding platform Kickstarter has posted new “Mature Content” rules banning projects that involve adult content and sextech.

WebGroup Czech Republic Settles Florida AV Suit, Will Pay $1.2 Million

WebGroup Czech Republic (WGCZ), the parent company of XVideos, XNXX, BangBros and GirlsGoneWild, has settled a lawsuit filed by the state of Florida over those sites’ alleged failure to age-verify Florida users before allowing access to adult content.

AEBN Publishes Popular Searches for March, April

AEBN has published the top search terms for March and April from its straight and gay theaters in all 50 states and the District of Columbia.

Ofcom Investigates Two Sites Over Possible AV Violations

U.K. media regulator Ofcom on Wednesday launched investigations into two adult sites as part of its age assurance enforcement program under the Online Safety Act (OSA).

Brazzers Launches Model Management Division 'Brazzers Creator'

Brazzers has launched its new full-service model management division, Brazzers Creator, offering content management services across multiple platforms.

Show More