Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Effective Threat Intelligence Through Vulnerability Analysis
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Effective Threat Intelligence Through Vulnerability Analysis

6 years ago Anastasios Arampatzis
Effective Threat Intelligence Through Vulnerability Analysis

Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort has been invested to capture, curate, taxonomize and communicate the vulnerabilities in terms of severity, impact and complexity of the associated exploit or attack.

Standardization in the description of vulnerabilities contributes not only to effective threat intelligence sharing but also to potentially efficient threat management if organizations, vendors and security researchers employ vulnerability management techniques and practices to actively seek to discover the vulnerabilities and respond in a timely fashion.

Significant efforts are being made to standardize this information to reduce communication barriers and complexity, leading to a more effective analysis of vulnerabilities and a better understanding of the context within which different vulnerabilities are discovered.

However, due to the challenges of categorizing vulnerabilities, these efforts are fraught with difficulty. Vulnerability data can be incomplete, inaccessible or inaccurate, and the quality of the resulting information has an impact on decision making, policies, and practices. Moreover, the vulnerability disclosure is influenced by a variety of factors, including financial incentives, the agenda of the disclosing stakeholder and the interaction of the various actors. Additionally, it’s important to note that this is all performed in a highly dynamic information security market.

The ENISA Report on the State of Vulnerabilities

To identify and highlight all the issues pertaining to effective vulnerability information sharing, ENISA collaborated with CERT-EU and academia to analyze and provide insight into both the opportunities and limitations that the vulnerability ecosystem offers.

Using the vulnerabilities published during the year of 2018 and Q1-Q2 of 2019 as a vehicle, the ENISA “State of Vulnerabilities 2018/2019” report attempts to answer questions related to the reliability, accuracy of the vulnerability sources and the widely accepted evaluation metrics. This study aims to address these challenges by completing three objectives:

  1. Represent the state of cybersecurity vulnerabilities in a form that allows stakeholders to make informed decisions on cybersecurity investments.
  2. Comprehensively analyze and correlate vulnerability data to better contextualize vulnerabilities.
  3. Analyze vulnerability data from a quality and reliability perspective.

Additionally, the report leverages the ATT&CK vulnerability taxonomy to explore and identify more intrinsic relationships and characteristics. The end goal of the report is to help the information security community, public/private organizations and vendors to make informed decisions about patching, prioritization of security controls and to improve their risk assessment process.

Vulnerabilities’ Standardization

Frequently, disclosed vulnerabilities are uniquely identified in accordance with the Common Vulnerabilities and Exposures (CVE) referencing system developed by MITRE. However, not all publicly disclosed vulnerabilities have an associated CVE-ID. Vulnerabilities kept private and not publicly disclosed are often referred to as “zero-day vulnerabilities,” and the corresponding exploits are referred to as zero-day (0day) exploits.

The severity of the impact of a vulnerability is defined using the Common Vulnerability Scoring System (CVSS) maintained by the Forum of Incident Response and Security Teams (FIRST). It is often provided as a qualitative value (Low, Medium or High) based on a quantitative calculation derived from the characteristics of individual vulnerabilities. The current CVSS version is v3.1, implemented in June 2019, but v2.0 values are often quoted for vulnerabilities prior to June 2015 when v3.0 was published.

The modern vulnerability lifecycle depicted in the figure below identifies significant milestones and events that define risk transitioning boundaries. The significance of risks increases as vulnerabilities trigger the creation of the associated exploits and decrease when the patches become available.

Figure 1: Vulnerability Lifecycle. Source: ENISA

Key Findings

The report provides a thorough analysis of the vulnerabilities’ datasets from January 2018 to August 2019. It’s is worth reading it to learn some of the key findings.

It’s apparent there are inconsistencies and discrepancies between the different sources. Although there is an authoritative database capturing vulnerability details, this does not imply that the information in that database is accurate. These inconsistencies have certain implications for organizations. Relying solely on one source – no matter how authoritative it may be – will lead an organization to potentially miss vital vulnerability information that affects their systems. In addition, although capable of providing a good reference for assessing, understanding and contrasting the impact and severity of vulnerabilities, the CVSS scoring system does not necessarily make up the “ground truth,” as other stakeholders may have a different view on the severity of a vulnerability.

Comparing the vulnerabilities over ATT&CK tactics, it is also evident that there is an uneven distribution. Defense Evasion, Persistence and Discovery are the preferred tactics for the exploits while Exfiltration, Initial Access and Impact tactics are not represented in the dataset.

Vulnerabilities vs ATT&CK tactics and CVSS v3 base score
Figure 2: Vulnerabilities vs ATT&CK tactics and CVSS v3 base score. Source: ENISA

There are significant differences between the two vulnerability measurement systems (CVSS v2 and CVSS v3) regarding the underlying recorded values, as well, which leads to different severity classifications. This is possibly attributed to the different wording of the categorical variables, thus creating a subjective bias that may, in turn, affect the risk management, planning and decision-making processes.

CVSS2 vs CVSS3
Figure 3: CVSS2 vs CVSS3. Source: ENISA

Microsoft has the highest number of vulnerabilities (600), which is more than 50% higher than the runner-up, Qualcomm. From an ATT&CK framework perspective, Cisco and Canonical have highly scoring vulnerabilities across the range of the tactics, whereas Microsoft is ranked among the lowest.

Vendors with most CVEs
Figure 4: Vendors with most CVEs. Source: ENISA

The exploit publication date of CRITICAL vulnerabilities is close to the vulnerability publication date, with the most exploits being published shortly before or after the vulnerability publication date.

The top 10 weaknesses account for almost two thirds (64%) of the vulnerabilities.

Most exploits target web and client-side related vulnerabilities.

A considerable amount of activity surrounds vulnerabilities that do not enter the CVE ecosystem, or if they do, it happens at a very late stage. Using the Zero Day Initiative (ZDI) dataset, ENISA concluded that there are statistically significant differences between the severity level of CVE (officially recorded) and non-CVE vulnerabilities (i.e. those that were not listed or included in the CVE databases), with the latter showing a higher score.

At least 8.65% of the vulnerabilities are exploitable. This number is expected to be higher due to zero-day exploits and the incompleteness of the datasets.

Conclusion

The ENISA report is an indication of the potential to generate intelligence, make informed decisions, and perform risk assessment exercises on software vulnerabilities. The systematic efforts of the computer security community to create a taxonomy and develop databases populated by structured vulnerability descriptors pave the way for a deeper exploration of the vulnerability ecosystem.

Tripwire is a strong proponent of an effective vulnerability management program. You may learn more by reading this anthology.

The post ” Effective Threat Intelligence Through Vulnerability Analysis” appeared first on TripWire

Source:TripWire – Anastasios Arampatzis

Tags: CERT, Critical Severity, Encryption, Exploit, High Severity, Low Severity, Medium Severity, Microsoft, Qualcomm, TripWire, Vulnerability

Continue Reading

Previous Critical Magento Flaws Allow Code Execution
Next Social Engineering: Hacking Brains…It’s Easier than Hacking Computers

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT