Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/24/2020
04:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Organizations Continue to Struggle With App Vulns

A high percentage of discovered bugs remain unremediated for a long time, a new study shows.

Chances are high that almost every single application an organization uses has at least one security vulnerability in it.

Contrast Security recently analyzed telemetry gathered between June 2019 and May 2020 from applications in development, testing, and operations at customer locations. The exercise found 96% of applications contained at least one security bug — more than one-quarter of them serious. Eleven percent of the applications analyzed had six or more serious vulnerabilities.

As usual, cross-site scripting errors, broken access control, and SQL injection errors topped the list of serious vulnerabilities that Contrast's researchers encountered. More than seven in 10 (72%) had insecure configuration vulnerabilities and 64% were vulnerable to sensitive data exposure.

Contrast's research shows attackers are relentlessly probing for these vulnerabilities to try and break into applications. The company counted over 13,000 attacks per month on average against individual applications — 98% of which were just probes that did not hit an existing vulnerability. Contrast counted a sharp increase — 179% over the previous year — in attacks targeting command injection vulnerabilities in particular. Though such flaws are rare, they are easy to scan for and allow attackers to take complete control of a web application server, says Jeff Williams, co-founder and CTO at Contrast Security.

"Enterprises need to recognize that their applications are both vulnerable and [under] attack," Williams says. "The data shows that attackers are persistent and use smart strategy by targeting the most prevalent vulnerabilities, with a special focus on vulnerabilities with the most critical impact."

Much of the attack traffic is generated by automated tools and, fortunately, never connects with the corresponding vulnerability.

"[They are] like rocks thrown at a building that don't hit a window," he says.

Contrast found many organizations are continuing to struggle with vulnerability remediation. The mean time to remediate a flaw was 67 days for all vulnerabilities and 36 days for the serious ones. The company found 50% of vulnerabilities are remediated in seven days and 62% of the serious ones in just three days.

But the time organizations are taking to address the remaining flaws tended to be much longer. In fact, Contrast found that if an organization did not remediate a discovered vulnerability within the first 30 days, the vulnerability tended to remain unresolved even after 90 days. In fact, even 65% of the serious flaws that were not remediated expeditiously tended to remain unremediated after 90 days heightening risk for organizations.

"Once a vulnerability survives that first 30 days, it's more likely to get put into a backlog," Williams says.

Someone might choose not to immediately remediate a flaw because they have another mitigating control in place. "But sometimes vulnerabilities are simply ignored by development teams and remain unfixed for long periods of time," Williams notes.

How to Prioritize Remediation
Joseph Feiman, chief strategy officer at WhiteHat Security, cites other reasons, as well, for organizations to drag their feet on vulnerability remediation.

"If the application security testing tool is not accurate and produces too many false positives, it will take too much time for developers to figure out which ones to prioritize," he says.

Feiman says the way organizations should prioritize their remediation efforts is to consider the severity of a disclosed flaw, determine how critical the vulnerable application is to the business, and determine how hard it is for a hacker to detect and exploit the issue.

Several organizations have severity-based vulnerability management policies and procedures in place that dictate the speed at which issues are remediated, says David Faraone, director and virtual CISO at the Crypsis Group.

"For example, a policy statement may state that for any vulnerability with a CVSS score of 9.0 or higher, organizations have an emergency procedure in place to patch 100% of these identified matters within 24 hours," he says.

Others might have higher risk thresholds based on the type of asset or system that is impacted. 

"For example, an organization's vulnerability management goal may have a target of patching 90% of all servers within two weeks of identifying the vulnerability impacting that system category, Faraone adds.

Ultimately, it is the maturity of the security team that determines how well, or not, an organization is at vulnerability remediation, Faraone says.

"An often overlooked precursor to managing critical risks is having a formal cyber-risk management program in a place that is supported by senior leadership," he says.

Related Content:

 

 

Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.