Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/25/2019
03:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Most Organizations Have Incomplete Vulnerability Information

Companies that rely solely on CVE/NVD are missing 33% of disclosed flaws, Risk Based Security says.

A new report shows companies that rely solely on the Common Vulnerabilities and Exposures (CVE) system for their vulnerability information are leaving themselves exposed to a substantial number of security issues they don't know about.

Risk Based Security's researchers have so far this year identified 5,970 more vulnerabilities than reported in the CVE and National Vulnerability Database (NVD). Of them, 18.4% had a CVSS v2 score ranging from 9 to 10, meaning they were considered critical. When vulnerabilities with a severity rating of 7 to 9 were also counted, some 43.5% of the 5,970 flaws not reported in the CVE/NVD system were either high risk or critical. Flaws not listed in CVE/NVD included those involving products from major vendors including Oracle, Microsoft, and Google.

"Organizations that rely on vulnerability intelligence are dealing with an alarming number of issues that impact all parts of their infrastructure," says Brian Martin, vice president of vulnerability intelligence at Risk Based Security.

CVE and NVD only include vulnerabilities that security vendors and researchers directly report to them. As a result, thousands of flaws that researchers discover and disclose in other ways are not getting listed in CVE/NVD, he says. According to Risk Based Security, organizations that rely solely on CVE/NVD likely miss 33% of all disclosed vulnerabilities, on average.

Researchers can disclose vulnerabilities in different ways and different places — from their own blogs to one of millions of repositories on GitHub. "GitHub currently has over 100 million repositories, and that is just a single site," Martin notes. "Factoring in BitBucket, SourceForge, GitLab, and many others, the amount of places a vulnerability may pop up is insane."

Researchers might blog about a vulnerability discovery but often don't cross-post the disclosure to known vulnerability reporting sites such as Bugtraq, Full-Disclosure, or PacketStorm. "Every week we find around a dozen more sources like this, as well as new software being released, or software and third-party libraries," Martin says.

In total, Risk Based Security's VulnDB team aggregated 16,738 security vulnerabilities in the first three quarters of 2019. Nearly half — 48% — had a severity score ranging from 6 to 10. Troublingly, exploit code or proof-of-concept code was available for 39% of the disclosed flaws that Risk Based Security's researchers counted for that time period.

Oracle topped the list of organizations with the most reported security vulnerabilities. Risk Based Security's data showed the company reported 969 security flaws in its products between Jan. 1 and the end of September. Google, with 945 flaws, and SUSE, with 812 flaws, were in second and third place, respectively.

Both Oracle and Google moved up in Risk Based Security's Top 10 list; last year Oracle ranked third and Google ranked fourth among companies that disclosed the most security vulnerabilities in their products. SUSE improved from topping the list last year to moving to the third spot so far in 2019. Meanwhile, Microsoft, which often is perceived as reporting more vulnerabilities than others, was in ninth spot with 485 vulnerabilities, while Cisco landed in 10th spot with 390 vulnerabilities.

As with last year, a majority of the disclosed bugs (10,868) over the past three quarters impacted system integrity. About 1,800 impacted availability and slightly more than 2,600 were related to confidentiality.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Home Safe: 20 Cybersecurity Tips for Your Remote Workers."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/28/2019 | 1:32:54 PM
Integrity
As with last year, a majority of the disclosed bugs (10,868) over the past three quarters impacted system integrity. About 1,800 impacted availability and slightly more than 2,600 were related to confidentiality. I bet integrity related vulnerabilities are impacting the functionality of the systems too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/28/2019 | 1:30:10 PM
Oracle
Oracle topped the list of organizations with the most reported security vulnerabilities. Risk Based Security's data showed the company reported 969 security flaws in its products between Jan. This is not surprising at all, Oracle is a very complex system.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/28/2019 | 1:27:34 PM
vulnerability reporting
Researchers might blog about a vulnerability discovery but often don't cross-post the disclosure to known vulnerability reporting sites such as Bugtraq, Full-Disclosure, or PacketStorm. " I wish this was a perfect process, but sometimes companies do not report available vulnerabilities, sometimes they neglect them.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/28/2019 | 1:23:21 PM
Risk
Risk Based Security's researchers have so far this year identified 5,970 more vulnerabilities than reported in the CVE and National Vulnerability Database (NVD). This makes sense, as it comes back to vulnerability analysis, unless done properly no way to know what is at risk.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/28/2019 | 1:20:19 PM
Incomplete Vulnerability
Incomplete Vulnerability Hes not surprising simply because most companies do not spend enough time to do the vulnerability analysis.
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...