Why CVE Management as a Primary Strategy Doesn’t Work

0
105
Why CVE Management as a Primary Strategy Doesn’t Work



As a safety researcher, widespread vulnerabilities and exposures (CVEs) are a difficulty for me — however not for the rationale you would possibly suppose.

While IT and safety groups dislike CVEs due to the menace they pose and the mountain of remediation work they create for them, what troubles me is the best way our trendy safety procedures relate to CVEs. Our mitigation methods have turn out to be too targeted on “vulnerability administration” and are too CVE-centric, when what we actually want is a hacker-centric strategy to successfully scale back our publicity.

Vulnerability administration as a main technique does not actually work. According to the National Institute for Standards and Technology, 20,158 new vulnerabilities had been found in 2021 alone. This represented the fifth consecutive 12 months of file numbers for vulnerability discovery, and it appears to be like like 2022 could very properly proceed the pattern. Security groups can’t moderately patch 20,000 new vulnerabilities a 12 months, and even when they may, they should not.

This would possibly sound counterintuitive, however there are just a few explanation why it is not. The first is that current analysis reveals that solely about 15% of vulnerabilities are literally exploitable, and so patching each vulnerability isn’t an efficient use of time for safety groups that haven’t any scarcity of duties. The second and equally vital purpose is that even in case you did repeatedly patch 100% of the CVEs in your community, this doubtless nonetheless would not be efficient at stopping hackers.

Hacker Strategies Are Vast and Varied

Phishing, spear-phishing, various ranges of social engineering, leaked credentials, default credentials, unauthenticated entry utilizing commonplace interfaces (FTP, SMB, HTTP, and so on.), accessible hotspots with no passwords, community poisoning, password cracking — the checklist of methods that hackers are using is huge and diverse, and many do not even require a high-level CVE, or any CVE in any respect, to be harmful to a corporation. The current Uber breach is a wonderful instance of how hackers exploited a corporation with out using the most recent CVEs or overly sophisticated assault strategies to focus on organizations.

Depending on whether or not you imagine what the hacker claimed on Uber’s Slack channel, or Uber’s current feedback, the hacker was both an 18-year-old who exfiltrated information from an Uber staffer by way of a intelligent social-engineering/spear-phishing assault, or the work of South American hacking group Lapsus$, which executed a spear-phishing assault, using the leaked credentials of a third-party contractor obtained from the Dark Web. In both situation, there was no sophisticated coding or vulnerability exploitation that went on right here. Instead, it was a variation on an old-school tactic that’s tried and true.

It’s Not The Vulnerability however the Vector That Matters

I do not need anybody to get the improper concept. Patching is essential; it is a crucial a part of a powerful safety posture, and an important part of each safety technique. The concern is that many instruments at present prioritize remediation suggestions based mostly solely on Common Vulnerability Scoring System (CVSS) scores, and what will get misplaced is the organizational context; the understanding of separate the significant 15% of vulnerabilities from the opposite 85%.

As an skilled penetration tester within the Israeli Defense Forces and vp of analysis, main a group of ex-pen testers and pink teamers at Pentera, what I’ve discovered is that it is not the vulnerability however the vector that issues. Just as a result of your assault does not start with a serious vulnerability does not imply it will not finish with one. The most harmful vulnerability to your group is perhaps a 5.7/10 CVSS rating hidden on the backside of a listing of high-scoring false positives.

Leaked Credentials Are a Bigger Threat

Leaked credentials doubtless pose a far better menace to the common group than the following dozen CVEs to be introduced mixed, but many organizations haven’t any protocol in place to find if any of their credentials are floating round within the darker components of the Web. We act as if hackers will spend numerous hours creating new CVEs, whereas they’re actually simply in search of probably the most environment friendly strategy to entry our networks. Many of at present’s hackers, and hacking teams, are financially motivated, and like all group they need the most effective ROI for his or her time. Why spend time executing an advanced assault when you possibly can simply purchase or scrape the credentials?

Right now, our defenses aren’t working, and we, as safety professionals, have to reexamine the place the weak factors are. While vulnerability administration is certainly a core a part of any significant safety technique, we have to transfer away from it as a main methodology. Instead, we have to take take a look at the methods hackers are using and base our safety methods on cease them. If we would like our safety to really be efficient towards lowering our publicity, our methods should give attention to understanding the real-world methods and methodologies that hackers are utilizing to take advantage of us.

LEAVE A REPLY

Please enter your comment!
Please enter your name here