Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/24/2020
04:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Organizations Continue to Struggle With App Vulns

A high percentage of discovered bugs remain unremediated for a long time, a new study shows.

Chances are high that almost every single application an organization uses has at least one security vulnerability in it.

Contrast Security recently analyzed telemetry gathered between June 2019 and May 2020 from applications in development, testing, and operations at customer locations. The exercise found 96% of applications contained at least one security bug — more than one-quarter of them serious. Eleven percent of the applications analyzed had six or more serious vulnerabilities.

As usual, cross-site scripting errors, broken access control, and SQL injection errors topped the list of serious vulnerabilities that Contrast's researchers encountered. More than seven in 10 (72%) had insecure configuration vulnerabilities and 64% were vulnerable to sensitive data exposure.

Contrast's research shows attackers are relentlessly probing for these vulnerabilities to try and break into applications. The company counted over 13,000 attacks per month on average against individual applications — 98% of which were just probes that did not hit an existing vulnerability. Contrast counted a sharp increase — 179% over the previous year — in attacks targeting command injection vulnerabilities in particular. Though such flaws are rare, they are easy to scan for and allow attackers to take complete control of a web application server, says Jeff Williams, co-founder and CTO at Contrast Security.

"Enterprises need to recognize that their applications are both vulnerable and [under] attack," Williams says. "The data shows that attackers are persistent and use smart strategy by targeting the most prevalent vulnerabilities, with a special focus on vulnerabilities with the most critical impact."

Much of the attack traffic is generated by automated tools and, fortunately, never connects with the corresponding vulnerability.

"[They are] like rocks thrown at a building that don't hit a window," he says.

Contrast found many organizations are continuing to struggle with vulnerability remediation. The mean time to remediate a flaw was 67 days for all vulnerabilities and 36 days for the serious ones. The company found 50% of vulnerabilities are remediated in seven days and 62% of the serious ones in just three days.

But the time organizations are taking to address the remaining flaws tended to be much longer. In fact, Contrast found that if an organization did not remediate a discovered vulnerability within the first 30 days, the vulnerability tended to remain unresolved even after 90 days. In fact, even 65% of the serious flaws that were not remediated expeditiously tended to remain unremediated after 90 days heightening risk for organizations.

"Once a vulnerability survives that first 30 days, it's more likely to get put into a backlog," Williams says.

Someone might choose not to immediately remediate a flaw because they have another mitigating control in place. "But sometimes vulnerabilities are simply ignored by development teams and remain unfixed for long periods of time," Williams notes.

How to Prioritize Remediation
Joseph Feiman, chief strategy officer at WhiteHat Security, cites other reasons, as well, for organizations to drag their feet on vulnerability remediation.

"If the application security testing tool is not accurate and produces too many false positives, it will take too much time for developers to figure out which ones to prioritize," he says.

Feiman says the way organizations should prioritize their remediation efforts is to consider the severity of a disclosed flaw, determine how critical the vulnerable application is to the business, and determine how hard it is for a hacker to detect and exploit the issue.

Several organizations have severity-based vulnerability management policies and procedures in place that dictate the speed at which issues are remediated, says David Faraone, director and virtual CISO at the Crypsis Group.

"For example, a policy statement may state that for any vulnerability with a CVSS score of 9.0 or higher, organizations have an emergency procedure in place to patch 100% of these identified matters within 24 hours," he says.

Others might have higher risk thresholds based on the type of asset or system that is impacted. 

"For example, an organization's vulnerability management goal may have a target of patching 90% of all servers within two weeks of identifying the vulnerability impacting that system category, Faraone adds.

Ultimately, it is the maturity of the security team that determines how well, or not, an organization is at vulnerability remediation, Faraone says.

"An often overlooked precursor to managing critical risks is having a formal cyber-risk management program in a place that is supported by senior leadership," he says.

Related Content:

 

 

Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27652
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27653
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27654
PUBLISHED: 2020-10-29
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp.
CVE-2020-27655
PUBLISHED: 2020-10-29
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.
CVE-2020-27656
PUBLISHED: 2020-10-29
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors.