Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/26/2009
04:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

NSA-Funded 'Cauldron' Tool Goes Commercial

Vulnerability analysis tool aggregates, correlates, and visually maps attack patterns and possibilities

A vulnerability analysis tool used by the National Security Agency (NSA) and U.S. Department of Homeland Security is now commercially available for enterprises that want to either make sense of their reams of vulnerability data or trace an actual data breach.

The Cauldron tool, which was developed by George Mason University's Center for Secure Information Systems (CSIS) under a research grant by the NSA and Air Force Research Labs, automates the analysis of all of a network's potential attack paths, from the network to the application level. It takes in vulnerability data from scanners, aggregating and correlating that data with vulnerability databases.

The so-called Topological Vulnerability Analysis (TVA) technology also provides graphical representations of exploit sequences and paths that attackers can use to break into a network or application. "The [GMU] project looked at ways to improve on the efficiency of reviewing vulnerabilities and trying to focus on what vulnerabilities should be resolved first -- with tons of network scans and data," says Oscar Fuster, vice president of marketing for Epok, a software and integration firm that is offering Cauldron to its clients as well as for direct sale. "That's what the product does: It aggregates these globs of data and different scans, and correlates and maps it so you can visually see what an attack pattern might look like -- and not just an attack from the outside."

Vulnerability management isn't new. Vendors such as RedSeal and Skybox offer similar analysis, notes Ivan Arce, CTO for Core Security Technologies, which sells penetration testing tools. "[Cauldron] does [resonate] with what we have been saying for years: Attackers use multistep attacks and do not constrain themselves to single-attack vectors," Arce says.

But the approach used by Cauldron is based on data from third-party vulnerability scanners and IDSes, he says -- data that is "purely theoretical" when it comes to attacks. "Therefore, its quality is derived purely on the quality of the inputs and on whether their model is actually valid and realistic," Arce says. "To address this problem from a theoretical model is one thing, and it's another thing to have some real means of demonstrating when this or that happens or not...when trying to compromise a system. That's what penetration testing is good for."

Fuster says Cauldron is more specialized than related vulnerability analysis tools in the market because it focuses specifically on aggregating, correlating, and visualizing, he says. "How would someone attack my database server? It draws you all of the attack paths someone could take by exploiting all of those vulnerabilities [in the network]," he says.

Vulnerabilty data is imported into Cauldron via an XML-based tool so that enterprises can analyze how bugs could be used to attack their critical assets, enabling them to pinpoint and prioritize fixes, Fuster says. And it can also be used to illustrate all of the attack paths once a breach is under way, or to conduct forensics after an attack.

Epok is marketing the tool to other government agencies, as well as companies in financial services and pharmaceuticals, for instance, as part of integration projects. Cauldron is also available for direct sale from Epok, starting at $15,000 for up to four subnets, and up to several hundred thousands of dollars for larger networks.

According to Cauldron's creators, among other functions the tool also lets users compare possible resource expenditures in the network to determine the effect on security overall, as well as "immediately observe any changes to individual machine configurations that increase the overall risk to the enterprise," GMU researchers wrote in a paper about the technology.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.