Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 27 |
Nodes: | 6 (0 / 6) |
Uptime: | 35:45:09 |
Calls: | 631 |
Calls today: | 2 |
Files: | 1,187 |
D/L today: |
22 files (29,767K bytes) |
Messages: | 172,999 |
What do folks make of this graph from the CISA data?
<https://blog.ostorlab.co/static/img/2024_01_10_Known_exploitable_vulnerabilities/distribution_of_RE_NRE_CVES.png>
REFERENCE:
*Ostorlab Known Exploitable Vulnerabilities: Catching them all*
<https://blog.ostorlab.co/known_exploitable_vulnerabilities_catching_them_all.html>
See also:
*Cybersecurity Insiders Vulnerability Comparison: Android vs iOS*
<https://www.cybersecurity-insiders.com/vulnerability-comparison-android-vs-ios-in-the-face-of-cyber-attacks/>
Apple - with arguably as many (or more) hardware and software products than Microsoft
Tyrone <none@none.none> wrote:
Apple - with arguably as many (or more) hardware and software products than >> Microsoft
https://gs.statcounter.com/os-market-share
badgolferman wrote:
Tyrone <none@none.none> wrote:
Apple - with arguably as many (or more) hardware and software products than >>> Microsoft
https://gs.statcounter.com/os-market-share
iOS consistently has more in-the-wild zero-days than Android flagships.
<https://bing.com/th/id/BCEI.558ae610-b94b-4d20-a760-0224f71df53e.png>
In some years, the difference is 3rCo4 times more than Pixels + Galaxies.
2020 zero-days: iOS = 5 Pixel/Galaxy = 2
2021 zero-days: iOS = 12 Pixel/Galaxy = 3
2022 zero-days: iOS = 9 Pixel/Galaxy = 2
2023 zero-days: iOS = 13 Pixel/Galaxy = 3
2024 zero-days: iOS = 10 Pixel/Galaxy = 2
2025 zero-days: iOS = 7 Pixel/Galaxy = 2
Pixel devices get patched immediately (as Google controls the hw + sw).
Galaxy devices lag slightly (a few weeks to a month) because Samsung
has to integrate Google's fixes into One UI, but Samsung is still far
ahead of most Android OEMs.
iOS Rapid Security Response (since iOS 16) has improved patch speed,
but it hasn't reduced the number of zero-days being exploited.
<https://bing.com/th/id/BCEI.cac39e40-757c-47be-9936-6cdfdd6fdc81.png>
2020: iOS=5 Pix/Gal=2 Cum iOS=5 Cum Pix/Gal=2
2021: iOS=12 Pix/Gal=3 Cum iOS=17 Cum Pix/Gal=5
2022: iOS=9 Pix/Gal=2 Cum iOS=26 Cum Pix/Gal=7
2023: iOS=13 Pix/Gal=3 Cum iOS=39 Cum Pix/Gal=10
2024: iOS=10 Pix/Gal=2 Cum iOS=49 Cum Pix/Gal=12
2025: iOS=7 Pix/Gal=2 Cum iOS=56 Cum Pix/Gal=14
But all of these are undercounts as zero-days are classified differently.
For example, webkit zero-days are omitted in the above, as are chrome.
But it gives us a rough idea where if the Apple trolls want to claim that
iOS is "more secure" than Android flagships like Pixels & Galaxies, let's
see their data.
https://gs.statcounter.com/os-market-share
iOS consistently has more in-the-wild zero-days than Android flagships.
What's the verifiable source of this data?
Tyrone <none@none.none> wrote:
Apple - with arguably as many (or more) hardware and software products than >> Microsoft
https://gs.statcounter.com/os-market-share
Chris wrote:
https://gs.statcounter.com/os-market-share
iOS consistently has more in-the-wild zero-days than Android flagships.
What's the verifiable source of this data?
FACTS.
Tyrone <none@none.none> wrote:
Apple - with arguably as many (or more) hardware and software products than >> Microsoft
https://gs.statcounter.com/os-market-share
Apple - with arguably as many (or more) hardware and software products than >>> Microsoft
https://gs.statcounter.com/os-market-share
What does that have to do with anything?
You have no source. Was it made up?
Chris wrote:
https://gs.statcounter.com/os-market-share
iOS consistently has more in-the-wild zero-days than Android flagships.
What's the verifiable source of this data?
FACTS.
1. Everyone but the Apple trolls has been providing the cites.
2. The only thing the Apple trolls do is not click on those cites.
3. Well, the Apple trolls do something else - they deny everything.
Apple trolls have been doing that for decades, and they're doing it now.
If the Apple trolls want to refute the cites, then let's see their cites.
HINT: Apple trolls almost never can find a cite for their belief system.
Now, to answer Chris' question for badgolferman's factual cite:
a. The source of badgolferman's data was Statcounter's web analytics data
<https://gs.statcounter.com/os-market-share>
b. Statcounter's operating system market share data is based on over
5 billion monthly page views collected from websites that use
their analytics service, so it's skewed toward web view activity.
c. It's broad and timely because it captures billions of real-world
visits, but it's biased toward websites using their analytics
Now, to answer Chris' question for Marion's factual cite:
a. The source of the graphs was the government's own respected CISA data.
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
b. CISA's vulnerability catalog is compiled from confirmed exploitation
reports across federal and private networks, so it reflects real-world
threat activity but may lag behind emerging or unreported exploits.
c. It's authoritative and grounded in verified incidents, but it's reactive
by nature & may miss zero-day threats or underreported vulnerabilities.
For decades, the Apple trolls have refuted all data that doesn't support their opinion of Apple (which was formed by brilliant Apple marketing).
Adults base their assessments/opinions on actual provable respected facts. Apple religious zealot nutcases don't (and never have, for decades).
Case in point:
1. My opinion is Windows has the most 0-days & iOS has more than
its flagship competitors combined, namely Pixels & Galaxies.
2. One set of facts backing up that opinion is the respected CISA data.
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
All I ask Chris to do is supply two things which I have supplied to him:
1. What is his opinion on the number of zero days for the various OS's?
2. What are the facts that back up his opinion (particularly for iOS)?
HINT: Watch how Apple religious zealot nutcases respond to a simple
question of where they get their data from. Just watch.
I'll simplify the question for Chris:
Q: Chris: What do you think the cumulative number of zero days
affecting iPhones are compared to Galaxy/Pixel flagships?
A: ?
Chris wrote:
You have no source. Was it made up?
a. The source of the graphs was the government's own respected CISA data.
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
b. CISA's vulnerability catalog is compiled from confirmed exploitation
reports across federal and private networks, so it reflects real-world
threat activity but may lag behind emerging or unreported exploits.
c. It's authoritative and grounded in verified incidents, but it's reactive
by nature & may miss zero-day threats or underreported vulnerabilities.
Q: Chris: What do you think the cumulative number of zero days
affecting iPhones are compared to Galaxy/Pixel flagships?
A: ?
Apple trolls have repeatedly countered you with verified data you refuse
to acknowledge.
On 9/28/2025 6:01 AM, Tom Elam wrote:Oops, it's 12 Android, 13 Samsung, 32 iOS, iPadOS, WatchOS.
<snip>
First let me state that I have two iPhones, an Apple Watch, and an iPad
Pro.
I looked at the spreadsheet from CISA, removed all the lines other than Android, Apple (iOS, iPadOS, and WatchOS), and Samsung.
It may not be perfect because so many of the Apple entries just said "Multiple Products" but I removed those lines even though they might
have included some of the mobile products.
Shared at https://docs.google.com/spreadsheets/ d/1h24C9L9TronxU2X0UVcpncM606NPDaIeRlM4FfA_bg4/
Totals
------
11 Android
13 Samsung
33 iOS, iPadOS, WatchOS
badgolferman wrote:
Tyrone <none@none.none> wrote:
Apple - with arguably as many (or more) hardware and software products than >>> Microsoft
https://gs.statcounter.com/os-market-share
iOS consistently has more in-the-wild zero-days than Android flagships.
<https://bing.com/th/id/BCEI.558ae610-b94b-4d20-a760-0224f71df53e.png
Firstly, I should acknowledge that you're trying to respond to my challenge to you to make proper comparative claims rather than focus purely on iOS deficiencies. As we all know, all software has bugs, vulnerabilities and deficiencies.
So well done.
Sadly, I can't reproduce your numbers, however.
a. The source of the graphs was the government's own respected CISA data. >> <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
b. CISA's vulnerability catalog is compiled from confirmed exploitation
reports across federal and private networks, so it reflects real-world >> threat activity but may lag behind emerging or unreported exploits.
c. It's authoritative and grounded in verified incidents, but it's reactive >> by nature & may miss zero-day threats or underreported vulnerabilities.
Some of that may be true, however, you don't reflect the true scale of the gaps in the CISA KEV. For example, KEV misses 94% of exploitable vulnerabilities found in the CVE list. https://medium.com/@yotamperkal/cisa-kev-a-balanced-perspective-ff3856e69ba9
On 9/28/2025 10:20 AM, sms wrote:
On 9/28/2025 6:01 AM, Tom Elam wrote:Oops, it's 12 Android, 13 Samsung, 32 iOS, iPadOS, WatchOS.
<snip>
First let me state that I have two iPhones, an Apple Watch, and an iPad
Pro.
I looked at the spreadsheet from CISA, removed all the lines other than
Android, Apple (iOS, iPadOS, and WatchOS), and Samsung.
It may not be perfect because so many of the Apple entries just said
"Multiple Products" but I removed those lines even though they might
have included some of the mobile products.
Shared at https://docs.google.com/spreadsheets/
d/1h24C9L9TronxU2X0UVcpncM606NPDaIeRlM4FfA_bg4/
Totals
------
11 Android
13 Samsung
33 iOS, iPadOS, WatchOS
As a result, *Android devices tend to be more susceptible to malware
Can we work together? You, me, Steve and badgolferman at least?Not possible as batch scripts are Windows only and barely portable.
Would you run this batch script on Windows, macOS or Linux please?
Can we work together? You, me, Steve and badgolferman at least?Not possible as batch scripts are Windows only and barely portable.
Would you run this batch script on Windows, macOS or Linux please?
I prefer open source, portable code like R. You can install R from here: https://cran.r-project.org/
You can find my version of the code here (note the 'blob:' is a valid
part of the url): blob:https://creativedemon.github.io/654c1274-4117-4e0b-adfb-48ca3dc38fa8
It reads the data and makes two plots. The general threat distribution
and the time-based comparison between iOS and Android (by best
approximation and given the significant caveats of CISA).
In any case, the exploits are closed after being discovered and it's not like there is an order of magnitude difference.
And of course these are only the zero-day-exploits, they don't represent
any other security concerns.
It's very difficult to install non-app store apps on an iOS device, but
it's fairly easy on Android.
As Chris pointed out, the CISA database is only about 6% of the known bugs.
As Chris pointed out, the CISA database is only about 6% of the known bugs.
That's not accurate. CISA only includes 6% of *exploitable*
vulnerabilities.
There are many, many more "bugs".
Chris wrote:
Can we work together? You, me, Steve and badgolferman at least?Not possible as batch scripts are Windows only and barely portable.
Would you run this batch script on Windows, macOS or Linux please?
Hi Chris,
I write portable code. I write extensible code. I write readable code.
I think ahead. I am always thinking strategically.
I want others to run the code so I wrote it to be cross platform portable. Out of the box.
I want others to improve the code so I wrote it to be easily extensible.
Out of the box.
Since you're trying to parse the data to get the truth out of it, I'll be gentle when I say "you're wrong" on that - but I understand why you think that powershell doesn't run on Linux or macOS so I'll explain further below.
I *designed* the process to run on Linux, macOS or Windows.
I just didn't test it on macOS or Linux but I designed it as X-platform.
Here is a readme that I just now wrote to make it more obvious to others
that what I wrote was designed to work on Linux, macOS and on Windows.
========================================================================
Begin README.txt (v1.0) for kev.ps1 (running kev.ps1 on all platforms).
========================================================================
This script analyzes the CISA Known Exploited Vulnerabilities (KEV)
database to compare Apple's iOS & Android-related security threats.
It works on macOS, Linux & Windows (I only tested it on Windows).
========================================================================
SCRIPT OVERVIEW: What kev.ps1 Does
========================================================================
kev.ps1 is a cross-platform PowerShell script that analyzes the CISA
Known Exploited Vulnerabilities (KEV) database to compare threats.
------------------------------------------------------------------------
KEY FEATURES
------------------------------------------------------------------------
1. Downloads the latest KEV CSV file from GitHub
(or uses a local copy if configured)
2. Filters out irrelevant entries (e.g., smart appliances, printers, IoT)
3. Uses keyword matching & vendor-product logic to identify:
a. iOS-specific vulnerabilities
b. Android-specific vulnerabilities
c. Shared vulnerabilities affecting both platforms
4. Saves results to timestamped log files in a ./logs directory:
a. ios_matches_YYYYMMDD_HHMMSS.log
b. android_matches_YYYYMMDD_HHMMSS.log
c. shared_matches_YYYYMMDD_HHMMSS.log
d. kev_output_YYYYMMDD_HHMMSS.log (summary)
5. Outputs results to the console (with added platform-detection info)
6. Includes toggle to count or exclude macOS vulnerabilities
7. Designed for portability across Windows, macOS, & Linux
8. Designed for extensibility to hone the desired output data.
========================================================================
Windows users can run kev.bat, but macOS & Linux users should follow
these instructions below to run kev.ps1 directly.
========================================================================
------------------------------------------------------------------------
REQUIREMENTS (PowerShell runs on Windows, macOS & Linux)
------------------------------------------------------------------------
PowerShell Core (pwsh) must be installed
<https://github.com/PowerShell/PowerShell>
------------------------------------------------------------------------
INSTALLATION
------------------------------------------------------------------------
macOS:
$ brew install --cask powershell
Ubuntu/Debian:
$ sudo apt-get install -y powershell
Fedora/RHEL:
$ sudo dnf install -y powershell
------------------------------------------------------------------------
USAGE
------------------------------------------------------------------------
1. Open a terminal & navigate to the folder containing kev.ps1
2. Run the script using PowerShell Core:
$ pwsh ./kev.ps1
3. If you see an execution policy error, bypass it temporarily:
$ pwsh -Command "Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass"
------------------------------------------------------------------------
OPTIONAL: Use Local CSV Instead of Downloading
------------------------------------------------------------------------
To avoid downloading the KEV CSV every time:
1. Edit kev.ps1 & change:
$useLocalFile = $false
to:
$useLocalFile = $true
2. Place kev.csv in the same folder as kev.ps1
------------------------------------------------------------------------
OUTPUT
------------------------------------------------------------------------
Results will be saved in the ./logs directory:
a. ios_matches_YYYYMMDD_HHMMSS.log
b. android_matches_YYYYMMDD_HHMMSS.log
c. shared_matches_YYYYMMDD_HHMMSS.log
d. kev_output_YYYYMMDD_HHMMSS.log
========================================================================
End of README.txt for kev.ps1, version 1.0
========================================================================
I prefer open source, portable code like R. You can install R from here:
https://cran.r-project.org/
From their FAQ:
"R is a system for statistical computation and graphics.
It consists of a language plus a run-time environment with graphics,
a debugger, access to certain system functions, and the ability to
run programs stored in script files."
That works fine I'm sure.
The real problem with parsing the CISA KEV database is how the database
is organized. The organization is what's difficult about parsing it.
You can find my version of the code here (note the 'blob:' is a valid
part of the url):
blob:https://creativedemon.github.io/654c1274-4117-4e0b-adfb-48ca3dc38fa8
I tried a couple of browsers and it said it didn't exist.
It reads the data and makes two plots. The general threat distribution
and the time-based comparison between iOS and Android (by best
approximation and given the significant caveats of CISA).
I'm sure those plots are nice, and if I had wanted them, what I'd use is Python which would go something like this first version (needs improvement).
########################################################################
# plotkev.py
# Requires: pandas, matplotlib
# Usage: python plotkev.py
########################################################################
# DESCRIPTION
########################################################################
# plotkev.py analyzes the CISA Known Exploited Vulnerabilities
# (KEV) database to compare iOS and Android-related security threats.
#
# It performs the following tasks:
# 1. Downloads the latest KEV CSV from GitHub
# 2. Filters out irrelevant entries (e.g., smart appliances, printers)
# 3. Uses keyword logic to classify each vulnerability as iOS, Android,
# Shared, or Other
# 4. Generates two plots:
# a. kev_distribution.png
# (Bar chart showing total vulnerabilities by platform)
# b. kev_time_comparison.png
# (Line chart showing cumulative vulnerabilities over time)
#
# This script is designed to approximate platform-specific threat exposure
# using public KEV data, with known limitations due to KEV scope and bias.
########################################################################
import pandas as pd
import matplotlib.pyplot as plt
from datetime import datetime
# Download or load the KEV CSV
csv_url =
"https://raw.githubusercontent.com/cisagov/kev-data/develop/known_exploited_vulnerabilities.csv"
df = pd.read_csv(csv_url)
# Define keyword logic
ios_keywords = [
"apple", "ios", "ipados", "watchos", "webkit", "safari",
"secure enclave", "coregraphics", "coremedia", "corefoundation",
"springboard", "launchd", "sandbox", "macos"
]
android_keywords = [
"android", "google", "pixel", "samsung", "qualcomm", "mediatek",
"play services", "keymaster", "keystore", "secure element", "omapi",
"webkit"
]
exclude_keywords = [
"refrigerator", "tv", "washer", "dryer", "smart appliance", "iot",
"industrial", "printer", "apple tv", "homepod", "airtag"
]
# Normalize text
df["text"] = (df["vendorProject"].fillna("") + " " +
df["product"].fillna("") + " " +
df["vulnerabilityName"].fillna("")).str.lower()
# Filter out irrelevant entries
for keyword in exclude_keywords:
df = df[~df["text"].str.contains(keyword)]
# Classify entries
def classify(row):
ios = any(k in row["text"] for k in ios_keywords)
android = any(k in row["text"] for k in android_keywords)
if ios and android:
return "Shared"
elif ios:
return "iOS"
elif android:
return "Android"
else:
return "Other"
df["Platform"] = df.apply(classify, axis=1)
# Plot 1: General Threat Distribution
platform_counts = df["Platform"].value_counts()
plt.figure(figsize=(8, 5))
platform_counts.plot(kind="bar", color=["skyblue", "lightgreen",
"orange", "gray"])
plt.title("General Threat Distribution (CISA KEV)")
plt.ylabel("Number of Vulnerabilities")
plt.xticks(rotation=0)
plt.tight_layout()
plt.savefig("kev_distribution.png")
plt.close()
# Plot 2: Time-Based Comparison
df["dateAdded"] = pd.to_datetime(df["dateAdded"], errors="coerce")
df = df.dropna(subset=["dateAdded"])
df["date"] = df["dateAdded"].dt.to_period("M").dt.to_timestamp()
time_series = df[df["Platform"].isin(["iOS", "Android", "Shared"])]
time_counts = time_series.groupby(["date",
"Platform"]).size().unstack(fill_value=0)
time_counts["iOS_total"] = time_counts["iOS"] + time_counts["Shared"]
time_counts["Android_total"] = time_counts["Android"] +
time_counts["Shared"]
plt.figure(figsize=(10, 6))
plt.plot(time_counts.index, time_counts["iOS_total"].cumsum(),
label="iOS", color="blue")
plt.plot(time_counts.index, time_counts["Android_total"].cumsum(),
label="Android", color="green")
plt.title("Cumulative Vulnerabilities Over Time")
plt.xlabel("Date Added to KEV")
plt.ylabel("Cumulative Count")
plt.legend()
plt.grid(True)
plt.tight_layout()
plt.savefig("kev_time_comparison.png")
plt.close()
########################################################################
# End of plotkev.py
########################################################################
This code will definitely not do what you want it to do. For example, you include "macos" in your you ios keywords list.
Plus, you don't deal with
iOS false positives like IOS and FortiOS.
This is getting long so I'll post the results in the next post instead.
But here is the comment section showing I added all your suggestions.
Please keep them coming as I don't care what the KEV database says.
I care only that we correctly analyze what it says.
It's what intelligent people do.
Here is the latest summary from that file (with macOS exploits excluded).
Marion wrote:
This is getting long so I'll post the results in the next post instead.
But here is the comment section showing I added all your suggestions.
Please keep them coming as I don't care what the KEV database says.
I care only that we correctly analyze what it says.
It's what intelligent people do.
Below is the latest kev.ps1 version
Below is the latest kev.ps1 version
ngs are a terrible place for sharing code. There are dozens of better ways used by millions of developers the world over. Keeping your privacy is also trivial.
On 29/09/2025 13:16, Marion wrote:
Not possible as batch scripts are Windows only and barely portable.
Can we work together? You, me, Steve and badgolferman at least?
Would you run this batch script on Windows, macOS or Linux please?
I prefer open source, portable code like R. You can install R from here: https://cran.r-project.org/
You can find my version of the code here (note the 'blob:' is a valid
part of the url): blob:https://creativedemon.github.io/654c1274-4117-4e0b-adfb-48ca3dc38fa8
What do folks make of this graph from the CISA data?
<https://blog.ostorlab.co/static/img/2024_01_10_Known_exploitable_vulnerabilities/distribution_of_RE_NRE_CVES.png>
REFERENCE:
*Ostorlab Known Exploitable Vulnerabilities: Catching them all*
<https://blog.ostorlab.co/known_exploitable_vulnerabilities_catching_them_all.html>
See also:
*Cybersecurity Insiders Vulnerability Comparison: Android vs iOS*
<https://www.cybersecurity-insiders.com/vulnerability-comparison-android-vs-ios-in-the-face-of-cyber-attacks/>
"iOS Security Landscape: On the other hand, iOS, developed by Apple,
follows a more closed ecosystem. This closed nature contributes to a
more controlled environment, where Apple meticulously reviews apps
before allowing them onto the App Store. This process significantly
reduces the risk of malicious apps reaching userso devices.
Additionally, iOS benefits from a unified hardware and software
platform, resulting in more timely updates and a reduced fragmentation problem. The use of a tightly controlled app distribution model and
strong encryption measures enhances the overall security posture of iOS."