The Vulnerability Explosion: Why Software Misconfigurations and Legacy Flaws Power Cybercrime

The number of cyberattacks is rising exponentially every year. Here are some ways to help close your security gap. 

By Ben Lipczynski
Director, Security Services

The cybersecurity landscape is under constant pressure from a relentless rise in software vulnerabilities and evolving threat actor tactics. Software misconfigurations in web applications and on-premises systems become critical entry points for threat actors to move unhindered through compromised environments. Addressing these vulnerabilities is essential for creating a robust IT infrastructure capable of countering cyber risks effectively, whether preventing an attack or reducing the impact of an attack on operations.

The numbers tell a sobering story. In 1999, 321 common vulnerabilities and exposures (CVEs) were issued. In 2024, the total number of CVE records climbed to 270,768 with over 40,000 incidents receiving the CVE identifier last year, according to Cyber Press. This represents a 38% increase over 2023, when there were 28, 818 formally logged vulnerabilities.

But volume isn’t everything. While the sheer number of reported vulnerabilities continues to grow, not all of them carry the same risk. Many remain unprioritized despite being actively exploited. Organizations must look beyond raw numbers and focus on prioritizing these risks based on their own context, not just theoretical severity.

 

Not all vulnerabilities are equal

Within the pool of over 280,000 known vulnerabilities, only a dynamic and evolving subset poses present danger to organizations. But at the same time, older vulnerabilities regularly become newly exploitable when threat actors develop new access tools and techniques.

To better manage vulnerabilities, organizations must continuously monitor threat intelligence, such as the information on Origina’s Vulnerability Advisory Portal. The portal identifies security risks associated with supported products and visually prioritizes vulnerabilities with the highest risk. It also alerts customers to critical cybersecurity risks as they develop and assures data accuracy by displaying timely, actionable intelligence through integration with Origina partner, SecAlliance.

Another crucial step is to effectively prioritize vulnerability remediation efforts based on an organization’s particular context. This is about maximizing limited resources. Here are just three examples of many types of data points.

  • Weaponized exploits
  • Use by ransomware or malware
  • Involvement in real-world attacks such as being listed in the United States Cybersecurity and Infrastructure Security Agency Known Exploited Vulnerabilities Catalog

 

Old vulnerabilities get weaponized

Security vulnerabilities can still be exploited by threat actors no matter what year they were assigned a CVE. For example, the percentage of new weaponized vulnerabilities slightly declined in 2022, but 539 older CVEs were weaponized for the first time. Some of these date as far back as 2004.

Organizations must adapt their security vulnerability management strategies to ensure historical threats are included. Mitigating older flaws can be just as crucial as addressing new ones. It’s important to identify risks and vulnerabilities regardless of when it was initially reported or age and version of the product.

 

The rise of IABs

A concerning trend in the threat actor ecosystem is the growth of initial access brokers (IABs), specialists who break into corporate networks and sell that access to other cybercriminals.

“Think of them as high-tech locksmiths for hire,” according to an article on Bleeping Computer. “They crack security systems and sell the ‘keys’ to ransomware groups and cyber criminals who launch their own attacks.”

IAB methods focus on:

  • Exploiting unpatched perimeter systems like firewalls and web applications
  • Abusing misconfigurations, including default credentials and exposed services
  • Using valid credentials obtained through brute force, theft, or purchase on the dark web

In 2022, for example, at least 17 new CVEs were added to the IAB toolkit, further empowering their operations, according to the 2023 Qualys Trurisk Research Report.

 

Web application vulnerabilities

Software misconfigurations continue to plague web applications. In an analysis of 370,000 apps, 25 million vulnerabilities were discovered, with 33% attributed to misconfiguration alone, according to Qualys.

Among supported products, Origina has identified that 74% of vulnerabilities have stemmed from open-source components and less than 15% from misconfigurations. Simple oversights—like verbose error messages or unprotected API endpoints—can expose sensitive data and leave applications open to attack.

According to the 2023 Qualys TruRisk report, the most common risks in web apps include:

  • Cryptographic failures: Missing or weak encryption can lead to session hijacking, stolen credentials, and exposed data
  • Broken access control: Allows unauthorized access or privilege escalation, like when the Optus breach exposed 9.5 million records via an open API
  • Injection attacks: Including SQL Injection, Cross-Site Scripting (XSS), and CSRF, mostly due to poor input validation.

Despite decades of security awareness, these remain among the most frequent and dangerous issues in modern web apps.

 

On-premises misconfigurations still pose major risks

In 2024, on-premises failures related to default configurations of software and applications, improper separation of user and/or administrator privileges, and insufficient internal network monitoring exposed organizations to vulnerabilities and potential attacks, including ransomware and data breaches.

Even simple missteps in areas like passwords or permissions can allow attackers to escalate privileges and establish footholds. A few years ago, Qualys detected over 100,000 potential misconfigurations, and in 2022, the most frequent on-premises failures related to:

  • Weak password policies
  • Improper user permissions
  • Windows update misconfigurations

A joint study by MITRE and Qualys showed a direct correlation between software misconfigurations and ransomware attack techniques, using the MITRE ATT&CK framework.

Cloud misconfigurations are linked to:

  • T1210: Remote service exploitation
  • T1485: Data destruction
  • T1530: Data theft from cloud storage

On-premises misconfigurations are linked to:

  • T1110: Brute-force attacks
  • T1021.001: RDP abuse
  • T1548: Privilege escalation

Misconfigurations are not passive oversights. They are active enablers of modern ransomware campaigns whose problem areas include attack surface reduction (ASR) settings being disabled, weak password and RDP configurations, and UNC path and firewall misconfigurations, which facilitate lateral movement.

Fortunately, some insecure defaults are now being overridden by administrators more than half the time, which is a sign of growing awareness and improved security posture.

 

Conclusion

Despite better tools and growing awareness, misconfigurations, credential abuse, and historical vulnerabilities remain core enablers of ransomware and advanced threats.

The path forward requires a contextual, risk-based, defense-in-depth framework that:

  • Prioritizes risk to most effectively utilize available resources
  • Offers hardening configurations
  • Monitors evolving threat intelligence
  • Treats older vulnerabilities as persistent threats

Cybersecurity is not just about checkbox patching — it’s about strategy, prioritization, and closing the doors attackers already know how to find. The old OEM patch/fix alone does not provide enough coverage to keep organizations safe from cyberattacks. To stay secure, organizations need expert independent software maintenance partners who can close security gaps and offer proactive monitoring and tailored solutions that extend the lifecycle of IT assets while also keeping them secure and compliant.

 

[BIO]

Origina Director of Security Services Ben Lipczynski served for 12 years in the British Royal Navy where he was responsible for the safety and security of numerous operations and systems, including advanced security solutions, mission-critical information systems, and strategic weapons engineering operations. After a stint as the Global IT/Communications Networks Operations Manager for the U.K. Ministry of Defense, Ben held various corporate cybersecurity roles at EY, Accenture, and Deloitte before joining Origina. He holds two patents, one for a multimodal object detection system with a 5G array and another for a dynamic end point configuration-based deployment of network infrastructure. Ben is also the co-author of a government white paper on the Command-and-Control process of future nuclear deterrence.

FOR THE LATEST TECHNOLOGY TIPS SUBSCRIBE TO OUR NEWSLETTER - THE UPTIME

Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.

LEARN MORE