Restricting admin rights heavily mitigates impact of Microsoft flaws
Businesses may have dampened the effects of a 48% year-on-year rise in vulnerabilities by simply restricting privileges
Microsoft fixed 1,268 vulnerabilities across its products during 2020, representing a massive 48% rise against reported flaws the previous year and a 181% surge in flaws since 2016.
While remote code execution exploits were still highly prevalent, the most common attack last year involved exploiting elevation of privilege flaws, with 559 vulnerabilities compared to 345 for remote code execution.
Vulnerabilities in this camp trebled over 2020 and accounted for 44% of all Microsoft flaws, according to Beyond Trust, while 56% of all critical flaws may have been mitigated by simply removing admin rights from endpoints.
“The huge jump in the number of vulnerabilities tells me that more and more security researchers are actively helping companies to protect themselves, but sadly also that the bad guys are doing the same to actively search for the vulnerabilities,” said Microsoft MVP and ethical hacker, Sami Laiho.
“There were numerous zero-day vulnerabilities in multiple different products last year and that means that proactive measures are even more important than ever before.
“The removal of admin rights is a great proactive protection, as you can see from the numbers in this report. We need to protect the components that execute malicious payloads, so our most important apps to protect are things that browse the web or read email.”
Beyond Trust’s annual report examined all flaws that Microsoft discloses throughout the last year affecting a series of its products including Windows, its web browsers, its Office productivity suite, and Windows Server.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Its release also coincides at a time businesses are reeling from a set of Microsoft Exchange Server flaws that have been actively exploited by Chinese state-backed hackers.
The number of flaws in Windows surged last year to 907, with Beyond Trust claiming that removing admin rights would've 70% of these. Similarly, Windows Server users will have encountered 902 flaws, with 66% of these potentially mitigated by restricting privileges. Both products reported considerably more vulnerabilities in 2020 than the previous year.
RELATED RESOURCE
Five critical questions to ask your identity provider
How to distinguish best-of-breed identity
Despite the powerful way in which restricting privileges can mitigate attacks, however, patching the vulnerabilities in the first place, when fixes are available, remains the best way to reduce risk.
The report claimed, however, that although may organisations understand the need to install security patches immediately upon release, the volume can be overwhelming at times.
For example, last year there were at least a couple of occasions when hundreds of patches from various vendors were released all at once - creating a ‘Fujiwhara effect’.
Beyond Trust’s report added that the reality is many companies are often under-resourced from an IT perspective and struggle with timely patching every critical flaw they encounter across their products.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Blackpoint Cyber and NinjaOne partner to bolster MSP cybersecurityNews The collaboration combines Blackpoint Cyber’s MDR expertise with NinjaOne’s automated endpoint management platform

