1. National Institute of Standards and Technology (NIST) Special Publication 800-40 Revision 3
Guide to Enterprise Patch Management Technologies:
Section 2.1
"The Need for Patch Management
" Page 6: "Flaw remediation is the most critical part of vulnerability management... Malicious parties can reverse engineer patches to create exploit code for the newly discovered vulnerability. Organizations that do not apply the patch promptly are vulnerable to attacks using the exploit code." This directly links the failure to patch with vulnerability to exploits.
2. Cisco
Cisco Annual Cybersecurity Report:
The 2018 report
for example
highlights the connection between unpatched systems and security incidents. Chapter 2
"Adversary Playbook
" Page 16: "Attackers continue to leverage well-known
unpatched vulnerabilities to infiltrate systems... They also continue to rely on malware as a primary tool for carrying out their campaigns." This establishes the direct relationship between unpatched vulnerabilities and malware infections.
3. Carnegie Mellon University
Software Engineering Institute (SEI)
Common Sense Guide to Mitigating Insider Threats
5th Edition:
Practice 17: "Implement a Patch Management Program
" Page 129: "Unpatched systems are vulnerable to a variety of attacks
including worms
viruses
and other types of malware... Attackers can also use unpatched vulnerabilities to gain unauthorized access to systems and data." This source confirms that a lack of patching leads to malware and unauthorized access (via exploits).