Microsoft's massive security update last week included patches for nine Windows 7 vulnerabilities, far fewer than were issued for Windows Vista and Windows XP. Microsoft last week patched nine vulnerabilities, five marked “critical,” in Windows 7, a move that will require users upgrading to the new operating system starting Thursday to download a security update to keep their PCs secure.The patches were the first for Windows 7’s final build, dubbed RTM for “release to manufacturing,” that has been in some customers’ hands, primarily enterprises with volume licensing agreements, since August.Windows 7’s patch count, however, was significantly less than either Windows Vista’s, its immediate predecessor, or that of Windows XP, the eight-year-old operating system installed on the majority of systems worldwide.An analysis by Computerworld of the massive Oct. 13 security update — the largest by Microsoft since it started patching on a regular monthly schedule six year ago — showed that Windows 7 was affected by nine of the 34 vulnerabilities, or 26% of the total. Its count of critical bugs — the most serious as marked by Microsoft — was five out of a possible 21, or 24%. Windows Vista, meanwhile, was impacted by 19 of the 34 vulnerabilities, or 56% of the total, with 11 pegged critical, or 52% of the possible.Windows XP was affected by the most vulnerabilities of all: 24 out of 34, or 71% of the total. Of the two-dozen bugs that needed patching in Windows XP, 18 were tagged as critical, or 86% of the total critical count. The tallies indicated that, at least this month, Windows 7 was afflicted with about half as many vulnerabilities as was Vista, and about a third as many as was Windows XP. Its critical bug count followed the same pattern.Those flaws that did affect Windows 7 were probably due to recycled code, said security experts. “The Windows 7 vulnerabilities are coming from its legacy code base,” said Jason Miller, the security and data team manager for patch management vendor Shavlik Technologies.In fact, none of the vulnerabilities patched last week were Windows 7-only flaws. Of the five security bulletins that affected the new OS, all five also impacted Vista and XP, and all but one had to be patched in the even-older Windows 2000.The phenomenon of vulnerabilities in old code isn’t new. Just months after Vista’s launch, security researchers took Microsoft to task for overlooking a vulnerability in Windows’ animated cursor in the brand-new operating system, even though was closely linked to a bug Microsoft had patched more than two years before.Microsoft has promoted Windows 7 as safer and more secure than its predecessor, something it did two three years ago when it touted Vista as better than XP. But everything is relative.Even Microsoft’s top expert on designing software with security in mind — a process Microsoft calls Security Development Lifecycle, or SDL — has admitted that it is virtually impossible to catch some kinds of bugs without tedious line-by-line review of the code, something even Microsoft is hard-pressed to do. On the bright side for Microsoft, three of the five critical vulnerabilities assigned to Windows 7 are in Internet Explorer 8 (IE8), the browser that ships with the new OS. The remaining two are in older editions of the .NET Framework and Silverlight, the .NET-based cross-browser, cross-platform media standard Microsoft’s pushing.Windows 7 was also unaffected by the eight vulnerabilities in GDI+ (Graphics Device Interface), which was put at the top of the to-patch list by most experts. Windows XP users had to apply six of the eight GDI+ fixes, while Vista users had to deploy just one.But that doesn’t mean researchers and hackers won’t uncover flaws in Windows 7, perhaps an increasing number as time goes on. “Unless Microsoft can make a brand-new operating system, bad things will continue to happen,” said Miller of Shavlik.Users already running Windows 7 can update now, but users who upgrade to Windows 7 starting this week will need to run Windows Update to obtain the patches after they’ve installed the new operating system. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe