Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/7/2008
11:40 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Black Hat: The Microsoft Exploitability Index: More Vulnerability Madness

On Tuesday, Microsoft introduced the "The Microsoft Exploitability Index." The software maker hopes this index will help companies more effectively prioritize the patches they need to deploy. I don't believe it will. And it may even make the vulnerability madness that exists today even more maddening.

On Tuesday, Microsoft introduced the "The Microsoft Exploitability Index." The software maker hopes this index will help companies more effectively prioritize the patches they need to deploy. I don't believe it will. And it may even make the vulnerability madness that exists today even more maddening.If you'd like to read the particulars, my colleague Thomas Claburn covered the Exploitability Index in some detail in his news story. Essentially, the index, Microsoft hopes, will provide more information about vulnerabilities to help its customers better determine which to first patch.

They will do this, by adding three designations:

1) Consistent Exploit Code Likely 2) Inconsistent Exploit Code Likely, and 3) Functioning Exploit Code Unlikely

The first one means a software flaw could be attacked with highly predictable results, and would probably be very easy to exploit. This would be very bad, as exploits would surface, and would be weaponized for mass use. This would be a critical vulnerability, and would need to be patched. Designation two could be bad, or it could be not-so-bad. Maybe an attacker could create an exploit, maybe not. And how the at-risk system reacts to the attack may not be very predictable. The third designation, Functioning Exploit Code Unlikely, is obvious: Microsoft has determined that developing a useful, functional attack tool would not be likely.

Now, how does this index help security and business managers better understand the risks associated with software vulnerabilities that they don't already have, such as Microsoft's existing low, moderate, important, and critical severity ratings? Not much. How will it change how organizations decide what patches are critical and need to be deployed first? Probably very little.

Let's say it's the second Tuesday of the month, and Microsoft releases a half-dozen security patches. (I know that is very, very, very hypothetical, but stick with me.) Two of these patches are ranked Consistent Exploit Code Likely; two are ranked Inconsistent Exploit Code Likely; and the remaining eight are all rated at Functioning Exploit Code Unlikely. Do you just decide to immediately patch those at the first ranking, then those at ranking two, and then patch those rated at ranking three sometime later?

The answers are: maybe, maybe, and maybe.

What if those ranked at "Consistent Exploit Code Likely" are all sitting deep in the infrastructure on systems that are well-mitigated through good security controls like firewalls and network segmentation, etc., and the data they hold is neither regulated, or all that important to the business? While the vulnerabilities rated at Inconsistent Exploit Code Likely are on systems sitting in the DMZ, or are fairly well-mitigated through security controls inside the infrastructure, but the systems hold data that is either regulated, or valuable to the business, or would be of value to an attacker for identity theft? What do you patch first?

This new index doesn't tell you. And it doesn't tell you much more than Microsoft's existing low, moderate, important, and critical severity rating system.

Don't get me wrong, this does add some new information to the threat/vulnerability assessment security managers need to make, but it may just end up clouding the decision process, not making it more transparent.

Follow my security updates on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.