Attacks/Breaches
6/11/2010
00:54 AM
Connect Directly
RSS
E-Mail
100%
0%

The Truth About Vulnerability Scanners

Scanning tools can help detect vulnerabilities, but they shouldn't be the only tools on your belt. Here's a look at three areas where scanners fall short

Excerpted from "Scanning Reality: Limits of Automated Vulnerability Scanners," a new report posted today in Dark Reading's Vulnerability Management Tech Center.

In some enterprises, the term "vulnerability management" begins and ends with scanning tools. For these enterprises, improving vulnerability management simply means bringing in more scanners to ensure a broad view.

But are network-based vulnerability scanners and Web application scanning tools enough to ensure that your organization will identify and remediate its security vulnerabilities -- before they are exploited by the bad guys? We submit that most IT organizations have a limited understanding of what these tools can do -- and where they fall short.

There are three key limitations of vulnerability scanners. Some of the risks around these problems can be mitigated by incorporating additional technologies into your vulnerability management program, while others are beyond the scope of any automated technology.

Whatever mitigation strategy is used to fill the gap left by these scanners, the first step is to understand their shortcomings.

The first problem area is authentication. Network-based vulnerability scanners are imperfect tools at best. Even when they are properly configured, they detect only vulnerabilities for which they have signatures. While anonymous (unauthenticated) scanning can provide some benefit, failure to leverage authenticated scanning dramatically reduces scanner effectiveness.

A second key problem is the scanner's inability to work with custom applications. CVE-based, known vulnerabilities are only a small subset of most organizations' overall attack surfaces. Security checks may exist for the most popular applications and operating systems hosted within your network, but what about the custom applications you have written in-house or outsourced to third parties? There are no CVEs for custom apps.

Finally, most vulnerability scanning tools can identify points of weakness, but they can't anticipate complex attack schemes. While vulnerability scanners typically identify and report on issues that can be utilized as the initial point of entry, they are limited in identifying the complex avenues an attacker could take to compromise your network.

Automated vulnerability scanners play a critical role in helping you manage and understand the security risks that may exist within your environment. However, like any tool, the capabilities and results of these tools need to be fully understood and their limitations noted.

To get details on these key limitations, and some recommendations on how to address them, download the full report.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4734
Published: 2014-07-21
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.

CVE-2014-4960
Published: 2014-07-21
Multiple SQL injection vulnerabilities in models\gallery.php in Youtube Gallery (com_youtubegallery) component 4.x through 4.1.7, and possibly 3.x, for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) listid or (2) themeid parameter to index.php.

CVE-2014-5016
Published: 2014-07-21
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to appl...

CVE-2014-5017
Published: 2014-07-21
SQL injection vulnerability in CPDB in application/controllers/admin/participantsaction.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to execute arbitrary SQL commands via the sidx parameter in a JSON request to admin/participants/sa/getParticipants_json, related to a search parameter...

CVE-2014-5018
Published: 2014-07-21
Incomplete blacklist vulnerability in the autoEscape function in common_helper.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to conduct cross-site scripting (XSS) attacks via the GBK charset in the loadname parameter to index.php, related to the survey resume.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.