• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Vancouver, WA
  • (360)-567-4950
  • Austin, TX
  • (512)-522-5834
  • info@centerlogic.com
  • Customer Portal
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
  • YouTube
Centerlogic IT Services

Centerlogic IT Services

The Customized IT Service Experience

  • IT Services
    • Managed IT Services
    • Managed Cybersecurity
    • Cloud Hosting Services
    • Website Hosting
    • Disaster Recovery
    • Business VoIP
    • Payment Processing
  • Industries We Serve
    • Small Business IT Support
    • Medical IT Solutions
    • Nonprofit IT Solutions
    • Hospitality IT Solutions
    • Government IT Solutions
  • Why Centerlogic?
    • About Us
    • Our Process
    • Careers
  • Resources
    • Customer Portal
    • Centerlogic Forms
    • Cybersecurity for Small Business
    • Blog
  • Contact
  • Support

The biggest software vulnerabilities

Oct 5, 2022 Blog

Software vulnerabilities are an unfortunate part of working with technology.

A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code.

The developer issues a patch to fix the vulnerability. But it’s not long before a new feature update causes more. It’s like a game of “whack-a-mole” to keep your systems secure. Without ongoing patch and update management, company networks are vulnerable. And these attacks are completely avoidable.

82% of U.S. cyberattacks in Q1 of 2022 were due to exploiting patchable vulnerabilities.

What new vulnerabilities are lurking in products from Microsoft, Google, Adobe, and others? We’ll go through several. These were recently noted in a warning by the Cybersecurity and Infrastructure Security Agency (CISA). Make sure to patch any of these vulnerabilities in your system. 

Microsoft Vulnerabilities

• CVE-2012-4969: An Internet Explorer vulnerability that allows the remote execution of code.
• CVE-2013-1331: This Microsoft Office flaw enables hackers to launch remote attacks.
• CVE-2012-0151: This Windows vulnerability allows user-assisted attackers to execute remote code.

Google Vulnerabilities

• CVE-2016-1646 & CVE-2016-518: These Chrome & Chromium engine vulnerabilities both allow attackers to conduct denial of
service attacks.

Adobe Vulnerabilities

• CVE-2009-4324: This is a flaw in Acrobat Reader that allows hackers to execute remote code via a PDF file.
• CVE-2010-1297: A Flash Player vulnerability that allows remote execution and denial of service attacks. (Flash Player is
no longer supported, so you should remove it).

Netgear Vulnerability

• CVE-2017-6862: This router flaw allows a hacker to execute code remotely.

Cisco Vulnerability

• CVE-2019-15271: This vulnerability impacts Cisco RV series routers, and gives a hacker “root” privileges. Patch & Update Regularly!

These are a few of the security vulnerabilities listed on the CISA list. You can see all 36 that were added at Cisa.How do you keep your network safe from these and other vulnerabilities?

You should patch and update regularly. Work with a trusted IT professional (like us) to manage your device and software updates. This ensures you don’t have a breach waiting to happen lurking in your network

Footer

Vancouvers Largest Technology Service and Support Company

Centerlogic is the Largest Technology Support and Service Company of Vancouver, WA

Centerlogic is the Largest Technology Support and Service Company of Vancouver, WA in 2017      Centerlogic is a top ranked MSP

Services

  • Managed IT Services
  • Cloud Hosting Services
  • Managed Cybersecurity
  • Cybersecurity Awareness Training
  • Business VoIP
  • Disaster Recovery

Info

  • Careers
  • About Centerlogic

Connect with Us

Vancouver, WA
7414 NE Hazel Dell Ave Ste B, Vancouver, WA 98665
Phone: (360)-567-4950
Email: info@centerlogic.com

Austin, TX
5555 N Lamar Blvd Ste L111, Austin, TX 78751
Phone: (512)-522-5834
Email: info@centerlogic.com

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
  • YouTube

Copyright © 2023 · Centerlogic, Inc · Privacy Policy