Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

09:45 AM
Larry Loeb
Larry Loeb
Larry Loeb

Researchers Seek 'Best' Vulnerability Remediation Strategy

Having to find the sweet spot between two competing forces is a delicate balancing act.

In their new paper "Improving Vulnerability Remediation Through Better Exploit Prediction," researchers from Cyentia, Virginia Tech, and the RAND Corporation take a detailed look at one of the most common infosecurity problems. The paper was given at the 2019 Workshop on the Economics of Information Security in Boston.

The researchers think that a key challenge that firms face is trying to identify a vulnerability remediation strategy that best balances two competing forces.

One strategy could attempt to patch all vulnerabilities on its network. While this would provide the greatest coverage of vulnerabilities patched, it also will inefficiently consume available resources by fixing low-risk vulnerabilities.

On the other hand, patching a few high-risk vulnerabilities would be highly efficient, but may leave the firm exposed to many other high-risk vulnerabilities.

They linked a large number of datasets with some machine learning to compare how various strategies delivered in real life.

However, they made a significant change in their modeling compared to other studies. Rather than just use predictions of exploitability, they used "exploits in the wild" as their outcome variable. It had to be real and out there for them to count it.

They said that, "Notably, we observe exploits in the wild for 5.5% of vulnerabilities in our dataset compared to 1.4% in prior works." Their dataset was quite extensive. It may be one of the largest used in such a study.

The study looked at security flaws, scores and vulnerability characteristics that were found in NIST's National Vulnerability Database (NVD).

They also found data about what was "in the wild" from FortiGuard Labs, as well as the SANS Internet Storm Center, Secureworks CTU, Alienvault's OSSIM metadata and ReversingLabs metadata.

Kenna Security provided a count of the prevalence of each vulnerability which was derived from Kenna's scans of hundreds of corporate (customer) networks.

The paper found that 4,183 security flaws from the total of 76,000 vulnerabilities that were discovered between 2009 and 2018 had been exploited in the wild.

Dispelling one of the most common myths in information security, they established that there was no correlation between the time of publication of proof-of-concept (PoC) exploit code on public websites and the start of exploitation attempts.

Another finding was that vulnerabilities that are exploited in the wild usually have a high CVSSv2 severity score. They think that going after vulnerabilities with a high CVSSv2 score and have been found as well to be active in the wild will get the most remediation done at the least effort.

But the study tried to find the best strategy among possible choices. They found that, "Overall, like the other rules-based strategies, focusing on individual features (whether CVSS, published exploit, or reference tags) as a decision point yields inefficient remediation strategies."

Whatever the model used is, they found that a machine learning approach used in remediation will reduce costs while it can maintain the existing level of coverage.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.