Restricting admin rights heavily mitigates impact of Microsoft flaws
Businesses may have dampened the effects of a 48% year-on-year rise in vulnerabilities by simply restricting privileges


Microsoft fixed 1,268 vulnerabilities across its products during 2020, representing a massive 48% rise against reported flaws the previous year and a 181% surge in flaws since 2016.
While remote code execution exploits were still highly prevalent, the most common attack last year involved exploiting elevation of privilege flaws, with 559 vulnerabilities compared to 345 for remote code execution.
Vulnerabilities in this camp trebled over 2020 and accounted for 44% of all Microsoft flaws, according to Beyond Trust, while 56% of all critical flaws may have been mitigated by simply removing admin rights from endpoints.
“The huge jump in the number of vulnerabilities tells me that more and more security researchers are actively helping companies to protect themselves, but sadly also that the bad guys are doing the same to actively search for the vulnerabilities,” said Microsoft MVP and ethical hacker, Sami Laiho.
“There were numerous zero-day vulnerabilities in multiple different products last year and that means that proactive measures are even more important than ever before.
“The removal of admin rights is a great proactive protection, as you can see from the numbers in this report. We need to protect the components that execute malicious payloads, so our most important apps to protect are things that browse the web or read email.”
Beyond Trust’s annual report examined all flaws that Microsoft discloses throughout the last year affecting a series of its products including Windows, its web browsers, its Office productivity suite, and Windows Server.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Its release also coincides at a time businesses are reeling from a set of Microsoft Exchange Server flaws that have been actively exploited by Chinese state-backed hackers.
The number of flaws in Windows surged last year to 907, with Beyond Trust claiming that removing admin rights would've 70% of these. Similarly, Windows Server users will have encountered 902 flaws, with 66% of these potentially mitigated by restricting privileges. Both products reported considerably more vulnerabilities in 2020 than the previous year.
RELATED RESOURCE
Five critical questions to ask your identity provider
How to distinguish best-of-breed identity
Despite the powerful way in which restricting privileges can mitigate attacks, however, patching the vulnerabilities in the first place, when fixes are available, remains the best way to reduce risk.
The report claimed, however, that although may organisations understand the need to install security patches immediately upon release, the volume can be overwhelming at times.
For example, last year there were at least a couple of occasions when hundreds of patches from various vendors were released all at once - creating a ‘Fujiwhara effect’.
Beyond Trust’s report added that the reality is many companies are often under-resourced from an IT perspective and struggle with timely patching every critical flaw they encounter across their products.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz
-
Busting nine myths about file-based threats
Whitepaper Distinguish the difference between fact and fiction when it comes to preventing file-based threats
By ITPro