Attacks/Breaches
6/11/2010
12:54 AM
100%
0%

The Truth About Vulnerability Scanners

Scanning tools can help detect vulnerabilities, but they shouldn't be the only tools on your belt. Here's a look at three areas where scanners fall short

Excerpted from "Scanning Reality: Limits of Automated Vulnerability Scanners," a new report posted today in Dark Reading's Vulnerability Management Tech Center.

In some enterprises, the term "vulnerability management" begins and ends with scanning tools. For these enterprises, improving vulnerability management simply means bringing in more scanners to ensure a broad view.

But are network-based vulnerability scanners and Web application scanning tools enough to ensure that your organization will identify and remediate its security vulnerabilities -- before they are exploited by the bad guys? We submit that most IT organizations have a limited understanding of what these tools can do -- and where they fall short.

There are three key limitations of vulnerability scanners. Some of the risks around these problems can be mitigated by incorporating additional technologies into your vulnerability management program, while others are beyond the scope of any automated technology.

Whatever mitigation strategy is used to fill the gap left by these scanners, the first step is to understand their shortcomings.

The first problem area is authentication. Network-based vulnerability scanners are imperfect tools at best. Even when they are properly configured, they detect only vulnerabilities for which they have signatures. While anonymous (unauthenticated) scanning can provide some benefit, failure to leverage authenticated scanning dramatically reduces scanner effectiveness.

A second key problem is the scanner's inability to work with custom applications. CVE-based, known vulnerabilities are only a small subset of most organizations' overall attack surfaces. Security checks may exist for the most popular applications and operating systems hosted within your network, but what about the custom applications you have written in-house or outsourced to third parties? There are no CVEs for custom apps.

Finally, most vulnerability scanning tools can identify points of weakness, but they can't anticipate complex attack schemes. While vulnerability scanners typically identify and report on issues that can be utilized as the initial point of entry, they are limited in identifying the complex avenues an attacker could take to compromise your network.

Automated vulnerability scanners play a critical role in helping you manage and understand the security risks that may exist within your environment. However, like any tool, the capabilities and results of these tools need to be fully understood and their limitations noted.

To get details on these key limitations, and some recommendations on how to address them, download the full report.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.