Module 2.3
Module 2.3
Module 2.3
Analyzing
and
Prioritizing
Vulnerabiliti
In this chapter you will learn:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:M/I:L/A:N
11.2 Validating Vulnerabilities
• Vulnerability scanners do not always pick up every single vulnerability, nor do they
always accurately detect vulnerabilities.
• It is up to the analyst to review and make sense of vulnerability data and findings
before passing that information on to others in the organization.
• The two most important outcomes of the review process are to determine the validity
of reported vulnerabilities and to determine exceptions to policies that may affect how
vulnerabilities are mitigated.
True Positives
• A true positive is a piece of data that can be verified and validated as correct.
• Distinguishing true positives from false positives, as well as their opposites, true and
false negatives, can be a tricky part of vulnerability remediation and prioritization.
• Once you receive data from vulnerability scan reports, you may find that verifying the
results is a straight-forward process.
• The goal of major databases such as the National Vulnerability Database (NVD) is to
publish common vulnerabilities and exposures (CVEs) for public awareness. These
databases are incredibly useful but do not always have complete information because
many vulnerabilities are still being researched. Therefore, you should use
supplemental sources in your research, such as Bugtraq, OWASP, and CERT.
False Positives
• A false positive (sometimes called a Type I error) is data that shows that a particular vulnerability
exists, but in fact, it does not. Usually, these issues arise from a misconfigured system, application,
or even the vulnerability scanning tool. An example of this would be if the vulnerability tool shows a
misconfiguration in the Apache web server on a system, when in reality Apache is not installed on
that system. This may have happened because the HTTPD service is running, for instance, but
there is no actual web server installed on the system.
False Positives (cont.)
• Although vulnerability scanners have improved over the years, operating system (OS) and
software detection in vulnerability scanners isn’t perfect. This makes detection in environments
with custom operating systems and devices particularly challenging. Many devices use lightweight
versions of Linux and Apache web server that are burned directly onto the device’s read-only
memory. You should expect to get a higher number of alerts in these cases because the
vulnerability scanner may not be able to tell exactly what kind of system it is. However, you should
also take care not to dismiss alerts immediately on these systems either. Sometimes a well-known
vulnerability may exist in unexpected places because of how the vulnerable software packages
were ported over to the new system.
True Negatives
• A true negative is an odd instance to understand. This is when the vulnerability scanner does not
detect an issue, and it’s because the issue truly doesn’t exist. So why would this be of concern?
Based on research and other indicators from the system, you may suspect that a vulnerability is
there, so you test for it.
• When the vulnerability scanner detects no actual vulnerability, it may cause you to wonder if the
tool is reporting accurately. You may be experiencing issues from the system, such as too much
bandwidth consumption or high processor utilization. While troubleshooting these issues, it’s not
uncommon to scan using a vulnerability tool. The true negative rules out the possibility that any
vulnerabilities you suspect exist are actually on the system. This is when you should start looking
at other causes—possibly hardware or software failures.
False Negatives
• A false negative, also referred to as a Type II error, is a result that indicates that no vulnerability is
present when, in fact, a vulnerability does actually exist. Reasons behind this outcome include a
lack of technical capability to detect the vulnerability.
• It could well be that a vulnerability is too new and that detection rules for the scanner do not yet
exist. Or perhaps an incorrect type of vulnerability scan was initiated by the analyst.
False Negatives (cont.)
• As troublesome as false positives are in terms of the effort expended to prove they are false, a
false negative is far worse, because in this case a vulnerability actually exists but is undetected, so
it will not be remediated and will be possibly exploitable. If other indicators lead you to believe that
there is an actual vulnerability present but the scanning tool does not detect it, you may have to do
further research and look at other indicators that could confirm the existence of the vulnerability,
such as critical file changes, processor utilization, bandwidth utilization, changes to privileges, and
so on. The worst false negative is the one that you never even know exists.
False Negatives (cont.)
• Exam Tip: When validating vulnerabilities, keep in mind that true positives are actual
vulnerabilities and should be included in your remediation strategy. False positives may use up a
lot of your time and energy simply to prove that they aren’t real vulnerabilities. True negatives
occur because there actually isn’t a vulnerability, but you may be led to believe that there is one
due to performance issues related to hardware or software. False negatives are the worst of all
vulnerabilities because there may in fact be a vulnerability that exists in the system that cannot be
detected through normal vulnerability scanning. You’ll likely see many scenarios on the exam that
focus on false positives, so understanding how to interpret data to determine if a false positive
exists is important.
Examining True Positives
• Compare to Best Practices or Compliance
• Reconcile Results
• Review Related Logs and/or Other Data Sources
• Determine Trends
Gaining as much information as possible about true-positive vulnerabilities will assist you in making
better remediation strategy decisions for them. Of particular importance is determining how a
vulnerability affects your compliance with governance since regulations or policy may require that you
mitigate a vulnerability faster, regardless of severity, system criticality, or other factors.
Context Awareness
• Context awareness is way of saying that you should weigh the likelihood of the vulnerability
actually being exploited, given the situation, versus its impact if it is exploited. Infrastructure
architecture and design weighs heavily on the situation in this case. Whether the system that may
contain the vulnerability is an internal system, an external system, or even physically or logically
isolated, the risk should be weighed in prioritizing vulnerability remediation.
• Context awareness is another way of saying that you should weigh the likelihood of the
vulnerability actually being exploited, given the situation, versus its impact if it is exploited.
Infrastructure architecture and design weighs heavily on the situation in this case. Whether the
system that may contain the vulnerability is an internal system, an external system, or even
physically or logically isolated, the risk should be weighed in prioritizing vulnerability remediation
Context Awareness
Internal
• Typically, internal systems contain the most sensitive information and are the most critical to
business operations. It only makes sense, then, that they would also be the most well protected.
This means that, if we go back to basic risk concepts, the impact to the system if it were
compromised by exploiting a vulnerability residing on that system would likely be very high.
• But the likelihood of an attacker being able to exploit the system may be very low due to
mitigations such as strong authentication and encryption controls, restrictive permissions, multiple
layers of defense, and so on. These factors should be considered in the situation when deciding
how quickly a vulnerability must be remediated.
Context Awareness
External
• External systems likely contain less sensitive information and may be less critical business
operations. This may not be the case, however, for publicly available web servers where
customers input transactions such as ordering goods and services, for instance. Therefore, these
external systems should also be highly protected, given the sensitivity of the information that is
processed on them, as well as the criticality to key business processes.
• These systems may require much faster vulnerability remediation as well since they are more
exposed to attacks than internal systems and may be reasonably expected to be compromised a
bit faster. Again, it really depends on two primary factors: information sensitivity and criticality to
business processes.
Context Awareness
Isolated
• Isolated systems are those that are logically and physically segmented or otherwise separated
from other networks and hosts. They may be completely physically separated, with no external
connections, or architected such that they only have minimum unidirectional connections to the
internal network and are separated by internal firewalls or other security devices, VLANs, or other
logical means.
• These segments are typically harder for an attacker to reach, except for a malicious insider, and
may not fall victim to the typical network-based attacks. Due to their isolation, the risk is much
lower, because the likelihood of a vulnerability being exploited on one of these hosts is much
lower. Vulnerabilities on these hosts may be prioritized at a lower remediation priority than others
since they are not easily exploitable, but they should still be mitigated as soon as practical.
Exploitability and Weaponization
• Another consideration in determining how quickly you need to remediate a vulnerability is how
easily the vulnerability is exploitable and weaponized. This relates somewhat to attack complexity,
so the CVSS Attack Complexity metric and other research you perform about the vulnerability will
help inform this decision. Generally, the more complex the attack required for exploitation is, the
less likely it is to succeed, and the less likely the vulnerability is to be exploited.
Exploitability and Weaponization
Asset Value
• Asset value is a very important consideration in the decision-making process for vulnerability
remediation and prioritization. Obviously, the higher value the asset, the more you will focus on
remediating vulnerabilities that are found in the system and its software. Asset value, remember, is
related to two important factors: sensitivity and criticality.
• Sensitivity refers to the confidentiality of the information or system, in that the more sensitive the
information, the more you will want to protect it from unauthorized access.
• Criticality means that the asset is very important to your business processes. Most of the time,
assets will be both sensitive and critical, but this is not always the case. For example, personal
information that resides on the system may be collected incidentally to the business but is not very
critical to its processes. However, that information still has to be stringently protected.
Exploitability and Weaponization
• It refers to either a vulnerability or exploit never before seen in public. A zero-day vulnerability is a
flaw in a piece of software that the vendor is unaware of and has not issued a patch or advisory
for. The code written to take advantage of this flaw is called the zero-day exploit.
• Zero-day vulnerabilities must be carefully and constantly monitored because often they are of
sufficient severity to warrant immediate remediation, especially when discovered on sensitive or
critical systems.