4.3 Analyzing Vulnerabilities Flashcards

(9 cards)

1
Q

Dealing with false information

A

False positives– A vulnerability is identified that doesn’t really exist
* This is different than a low-severity vulnerability– It’s real, but it may not be your highest priority
* False negatives– A vulnerability exists, but you didn’t detect it
* Update to the latest signatures– If you don’t know about it, you can’t see it
* Work with the vulnerability detection manufacturer– They may need to update their signatures for your
environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prioritizing vulnerabilities

A
  • Not every vulnerability shares the same priority– Some may not be significant– Others may be critical
  • This may be difficult to determine– The research has probably already been done
  • Refer to public disclosures and vulnerability databases– The industry is well versed– Online discussion groups, public disclosure mailing lists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CVSS

A
  • National Vulnerability Database: http://nvd.nist.gov/– Synchronized with the CVE list– Enhanced search functionality
  • Common Vulnerability Scoring System (CVSS)– Quantitative scoring of a vulnerability - 0 to 10– The scoring standards change over time– Different scoring for CVSS 2.0 vs CVSS 3.x
  • Industry collaboration– Enhanced feed sharing and automation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVE

A
  • The vulnerabilities can be cross-referenced online– Almost all scanners give you a place to go
  • National Vulnerability Database: http://nvd.nist.gov/– Common Vulnerabilities and Exposures (CVE):– https://cve.mitre.org/cve/
  • Microsoft Security Bulletins:– https://www.microsoft.com/technet/security/
    current.aspx
  • Some vulnerabilities cannot be definitively identified– You’ll have to check manually to see if a system is
    vulnerable– The scanner gives you a heads-up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability classification

A
  • The scanner looks for everything– Well, not everything - The signatures are the key
  • Application scans– Desktop, mobile apps
  • Web application scans– Software on a web server
  • Network scans– Misconfigured firewalls, open ports, vulnerable
    devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exposure factor

A
  • Loss of value or business activity if the
    vulnerability is exploited– Usually expressed as a percentage
  • A small DDoS may limit access to a service– 50% exposure factor
  • A buffer overflow may completely disable a service– 100% exposure factor
  • A consideration when prioritizing– Worst possible outcome probably gets priority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Environmental variables

A
  • What type of environment is associated with this
    vulnerability?– Internal server, public cloud, test lab
  • Prioritization and patching frequency– A device in an isolated test lab– A database server in the public cloud– Which environment gets priority?
  • Every environment is different– Number and type of users (internal, external)– Revenue generating application– Potential for exploit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Industry/organizational impact

A
  • Some exploits have significant consequences– The type of organization is an important consideration
  • Tallahassee Memorial HealthCare - February 2023– Ransomware - closed for two weeks– Diverted emergency cases, surgeries canceled
  • Power utilities - Salt Lake City, LA County CA - March 2019– DDoS attacks from an unpatched known vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk tolerance

A
  • The amount of risk acceptable to an organization– It’s impractical to remove all risk
  • The timing of security patches– Patching immediately doesn’t allow for proper
    testing
  • Testing takes time– While you’re testing, you’re also vulnerable
  • There’s a middle ground– May change based on the severity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly