Large-scale vulnerability notifications (VNs) can help hosting provider organizations (HPOs) identify and remediate security vulnerabilities that attackers can exploit in data breaches or phishing campaigns. Previous VN studies have primarily focused on factors under the control of reporters, such as sender reputation, email formatting, and communication channels. Despite these efforts, remediation rates for vulnerability notifications continue to remain consistently low. This paper presents the first in-depth study of how HPOs process vulnerability notifications internally and what organizational and operational factors influence VN effectiveness. We examine the problem from a different perspective to provide the first detailed understanding of the reasons behind persistently low remediation rates. Instead of manipulating parameters of VN campaigns, we interview hosting providers directly, investigating how they handle vulnerability notifications and what factors may influence VN effectiveness, such as VN awareness and reachability, HPOs' service models, and perceived security risks. We conducted semi-structured interviews with 24 HPOs across shared hosting and web development services, representing varied company sizes and operator roles. Our findings reveal practical insights on VN processing and abuse workflows. While some providers remain hard to reach due to complex infrastructures, most report routinely handling VNs. However, limited remediation often stems from strict responsibility boundaries, where web application issues are seen as the customer's domain. Low hosting fees and high volumes of daily compromises further discourage both proactive and reactive measures. Our findings show that HPOs blame negligent website owners, and prior works on website owners confirms they often undervalue their sites or lack security know-how.
翻译:大规模漏洞通知(VNs)有助于托管服务提供商组织(HPOs)识别并修复攻击者在数据泄露或钓鱼活动中可利用的安全漏洞。以往的漏洞通知研究主要聚焦于报告方可控的因素,如发送方信誉、邮件格式及通信渠道。尽管已有诸多努力,漏洞通知的修复率仍持续处于低位。本文首次深入研究了HPOs内部如何处理漏洞通知,以及哪些组织与运营因素影响漏洞通知的有效性。我们从不同视角审视该问题,首次详细揭示了修复率持续低迷背后的原因。我们未操纵漏洞通知活动的参数,而是直接访谈托管服务提供商,探究其如何处理漏洞通知,以及哪些因素可能影响漏洞通知效果,例如漏洞通知的认知度与可达性、HPOs的服务模式及感知安全风险。我们对24家涵盖共享托管与网站开发服务的HPOs进行了半结构化访谈,受访公司规模与运营角色各异。研究发现揭示了漏洞通知处理与滥用工作流的实际洞察:尽管部分提供商因复杂基础设施仍难以触及,但多数报告称会常规处理漏洞通知。然而,有限的修复往往源于严格的责任边界——Web应用问题常被视为客户责任范畴。低廉的托管费用与每日高发的入侵事件进一步抑制了主动与被动防护措施。研究显示,HPOs将问题归咎于疏忽的网站所有者,而先前针对网站所有者的研究也证实,他们常低估其网站价值或缺乏安全专业知识。