The Laws of Vulnerabilities The Laws of Vulnerabilities Terry Ramos - - PowerPoint PPT Presentation

the laws of vulnerabilities the laws of vulnerabilities
SMART_READER_LITE
LIVE PREVIEW

The Laws of Vulnerabilities The Laws of Vulnerabilities Terry Ramos - - PowerPoint PPT Presentation

The Laws of Vulnerabilities The Laws of Vulnerabilities Terry Ramos Terry Ramos Qualys Qualys 02/15/06 - HT1-202 02/15/06 - HT1-202 Are We Getting Better or Worse ? What is a vulnerability? How significant is this vulnerability? How


slide-1
SLIDE 1

The Laws of Vulnerabilities The Laws of Vulnerabilities

Terry Ramos Qualys 02/15/06 - HT1-202 Terry Ramos Qualys 02/15/06 - HT1-202

slide-2
SLIDE 2

Are We Getting Better or Worse ?

What is a vulnerability? How significant is this vulnerability? How prevalent is this vulnerability? How easy is this vulnerability to exploit? Are any of my systems affected by this vulnerability? How quickly should I patch this vulnerability?

slide-3
SLIDE 3

Security Trend Indicators

  • Malicious Code (↑)
  • Vulnerabilities (↑)
  • Spam and Spyware (↑)
  • Phishing and Identity Theft (↑)

….and

  • Time to Exploitation (↓)
slide-4
SLIDE 4

First Generation Threats

  • Spreading mostly via email, file-sharing
  • Human Action Required
  • Virus-type spreading / No vulnerabilities
  • Examples: Melissa Macro Virus, LoveLetter

VBScript Worm

  • Replicates to other recipients
  • Discovery/Removal: Antivirus
slide-5
SLIDE 5

Second Generation Threats

  • Active worms
  • Leveraging known vulnerabilities
  • Low level of sophistication in spreading

strategy (i.e. randomly)

  • Non Destructive Payloads
  • Remedy: Identify and Fix Vulnerabilities
slide-6
SLIDE 6

Third Generation Threats

  • Automated Attacks Leveraging Known and Unknown

Vulnerabilities

  • Collaboration of Social Engineering and Automated

Attacks

  • Multiple Attack Vectors

— Email, Web, IM, Vulnerabilities,…

  • Active Payloads
  • Remedy: Security Enforcement / NAC / NAM
slide-7
SLIDE 7

The Laws of Vulnerabilities: Studying Vulnerabilities and Patching

  • Objective: Understanding prevalence of critical vulnerabilities over time

in real world

  • Timeframe: 2002 - Ongoing
  • Data Source:

70% Global Enterprise networks

30 % Random trials

  • Methodology: Automatic Data collection with statistical data only – no

possible correlation to individual user or systems

  • Scanning: Agentless/Remote
slide-8
SLIDE 8

1 2 3 4 5 6 7 8 Q402 Q103 Q203 Q303 Q403 Q104 Q204 Q304 Q404 Q105 Q205 Q305 Millions Internal/Intranet Scans External/Perimeter Scans

Analyzing 32,000,000 Vulnerability Scans

Blaster Worm Witty Worm Zotob Worm Slammer Worm Sasser Worm

slide-9
SLIDE 9

Raw Results

  • Largest collection of global real-world

vulnerability data:

—32,147,000 IP-Scans from Q3/2002 to Q3/2005 —21,347,000 critical vulnerabilities identified

  • Scope of Vulnerabilities included

—1,060 out of 1,556 unique critical* vulnerabilities

* Providing an attacker the ability to gain full control of the system, and/or leakage of highly sensitive information. For example, vulnerabilities may enable full read and/or write access to files, remote execution of commands, and the presence of backdoors.

slide-10
SLIDE 10

The Changing Vulnerability Landscape

  • From server to client applications
  • Before: Vulnerabilities in server applications:

— Webserver, Mailserver, Operating System services,

  • Now: More than 60% of new critical vulnerabilities in

client applications:

— Web Browser, Backup Software, Media Player, Antivirus

Software, Flash, …

slide-11
SLIDE 11

0% 20% 40% 60% 80% 100% 120% 10/5/2002 12/5/2002 2/5/2003 4/5/2003 6/5/2003 8/5/2003 10/5/2003 12/5/2003 2/5/2004 4/5/2004 6/5/2004 8/5/2004 10/5/2004 12/5/2004 2/5/2005 4/5/2005 6/5/2005 8/5/2005 WebDAV Buffer Overflow

Microsoft WebDAV Vulnerability

Microsoft Windows 2000 IIS WebDAV Buffer Overflow Vulnerability

CAN-2003-0109 Qualys ID 86479 Released: March 2003

Microsoft Windows 2000 IIS WebDAV Buffer Overflow Vulnerability

CAN-2003-0109 Qualys ID 86479 Released: March 2003

slide-12
SLIDE 12

0% 20% 40% 60% 80% 100% 120% 10/5/2002 12/5/2002 2/5/2003 4/5/2003 6/5/2003 8/5/2003 10/5/2003 12/5/2003 2/5/2004 4/5/2004 6/5/2004 8/5/2004 10/5/2004 12/5/2004 2/5/2005 4/5/2005 6/5/2005 8/5/2005 Microsoft LSASS

Buffer Overflow in Microsoft Local Security Authority Subsystem Service (LSASS)

Buffer overflow in Microsoft Local Security Authority Subsystem Service (LSASS)

CAN-2003-0533 Qualys ID 90108 Released: April 2004

Buffer overflow in Microsoft Local Security Authority Subsystem Service (LSASS)

CAN-2003-0533 Qualys ID 90108 Released: April 2004

slide-13
SLIDE 13

Vulnerability Half-Life

19 days

25% 50% 75% 100%

38 days 57 days 76 days 95 days

For a critical vulnerability every 19 days the number

  • f vulnerable systems

is reduced by 50% on external systems For a critical vulnerability every 19 days the number

  • f vulnerable systems

is reduced by 50% on external systems

114 days

slide-14
SLIDE 14

0.00% 20.00% 40.00% 60.00% 80.00% 100.00% 120.00% 10/5/2002 1/5/2003 4/5/2003 7/5/2003 10/5/2003 1/5/2004 4/5/2004 7/5/2004 10/5/2004 1/5/2005 4/5/2005 7/5/2005

Exchange Server Buffer Overflow

Microsoft Exchange Server Buffer Overflow Vulnerability

Microsoft Exchange Server Buffer Overflow Vulnerability

CAN-2003-0714 Qualys ID 74143 Released: October 2003

Microsoft Exchange Server Buffer Overflow Vulnerability

CAN-2003-0714 Qualys ID 74143 Released: October 2003

slide-15
SLIDE 15

0% 20% 40% 60% 80% 100% 120% 10/5/2002 12/5/2002 2/5/2003 4/5/2003 6/5/2003 8/5/2003 10/5/2003 12/5/2003 2/5/2004 4/5/2004 6/5/2004 8/5/2004 10/5/2004 12/5/2004 2/5/2005 4/5/2005 6/5/2005 8/5/2005

Adobe Acrobat Format String Vulnerability

Adobe Acrobat Reader Format String Vulnerability

Adobe Acrobat Reader Format String Vulnerability

CAN-2004-1153 Qualys ID 38385 Released: December 2004

Adobe Acrobat Reader Format String Vulnerability

CAN-2004-1153 Qualys ID 38385 Released: December 2004

slide-16
SLIDE 16

0% 20% 40% 60% 80% 100% 120% 10/5/2002 12/5/2002 2/5/2003 4/5/2003 6/5/2003 8/5/2003 10/5/2003 12/5/2003 2/5/2004 4/5/2004 6/5/2004 8/5/2004 10/5/2004 12/5/2004 2/5/2005 4/5/2005 6/5/2005 8/5/2005

SMB Remote Execution Vulnerability

Microsoft Server Message Block Remote Execution (MS05-011)

Remote Code Execution Vulnerability in Microsoft Server Message Block (SMB)

CAN-2005-0045 Qualys ID 90230 Released: February 2005

Remote Code Execution Vulnerability in Microsoft Server Message Block (SMB)

CAN-2005-0045 Qualys ID 90230 Released: February 2005

slide-17
SLIDE 17

External vs. Internal Half-life

19 days

25% 50% 75% 100%

38 days 57 days 76 days 95 days

For a critical vulnerability every 19 days (48 days on internal networks) 50 % of vulnerable systems are being fixed For a critical vulnerability every 19 days (48 days on internal networks) 50 % of vulnerable systems are being fixed

114 days 133 days 152 days 171 days

slide-18
SLIDE 18

The Changing Half-life

2003 2004 2005 2006 External Half-life 30 days 21 days 19 days 48 days ? Internal Half-life

  • 62

days ?

slide-19
SLIDE 19

0% 20% 40% 60% 80% 100% 120% 7/30/2005 8/6/2005 8/13/2005 8/20/2005 8/27/2005 9/3/2005 9/10/2005 9/17/2005 9/24/2005 10/1/2005 Predefined Release

Predefined vs. Irregular Vulnerability Releases

0% 20% 40% 60% 80% 100% 120% 7/30/2005 8/6/2005 8/13/2005 8/20/2005 8/27/2005 9/3/2005 9/10/2005 9/17/2005 9/24/2005 10/1/2005 Irregular Release

Vulnerabilities released

  • n a predefined known

schedule show 18% faster patch response Vulnerabilities released

  • n a predefined known

schedule show 18% faster patch response

slide-20
SLIDE 20

500 1000 1500 2000 2500 3000 3500 3/1/2003 5/1/2003 7/1/2003 9/1/2003 11/1/2003 1/1/2004 3/1/2004 5/1/2004 7/1/2004 9/1/2004 11/1/2004 1/1/2005 3/1/2005 5/1/2005 7/1/2005 9/1/2005 SSL Server allows Cleartext

SSL Server Allows Cleartext Communication

SSL Server Allows Cleartext Communication

Qualys ID 38143

SSL Server Allows Cleartext Communication

Qualys ID 38143

slide-21
SLIDE 21

0% 20% 40% 60% 80% 100% 120% 2/8/2003 4/8/2003 6/8/2003 8/8/2003 10/8/2003 12/8/2003 2/8/2004 4/8/2004 6/8/2004 8/8/2004 10/8/2004 12/8/2004 2/8/2005 4/8/2005 6/8/2005 8/8/2005

SQL Slammer Vulnerability

SQL Slammer Vulnerability

MS-SQL 8.0 UDP Slammer Worm Buffer Overflow Vulnerability

CAN-2002-0649 Qualys ID 19070 Released: July 2002

MS-SQL 8.0 UDP Slammer Worm Buffer Overflow Vulnerability

CAN-2002-0649 Qualys ID 19070 Released: July 2002

slide-22
SLIDE 22

Lingering Vulnerabilities: SNMP Writable

0% 20% 40% 60% 80% 100% 120% 10/5/2002 1/5/2003 4/5/2003 7/5/2003 10/5/2003 1/5/2004 4/5/2004 7/5/2004 10/5/2004 1/5/2005 4/5/2005 7/5/2005

SNMP Writeable

slide-23
SLIDE 23

Vulnerability Lifespan

19 days

25% 50% 75% 100%

38 days 57 days 76 days 95 days

4% of critical vulnerabilities remain persistent and their lifespan is unlimited 4% of critical vulnerabilities remain persistent and their lifespan is unlimited

114 days

slide-24
SLIDE 24

Window of Exposure

19 days

25% 50% 75% 100%

38 days 57 days 76 days 95 days

80% of exploits are available within the first half-life period of critical vulnerabilities 80% of exploits are available within the first half-life period of critical vulnerabilities

114 days

slide-25
SLIDE 25

A Continuous Cycle of Infection

20 40 60 80 100 120 140 160 180 3/1/2003 5/1/2003 7/1/2003 9/1/2003 11/1/2003 1/1/2004 3/1/2004 5/1/2004 7/1/2004 9/1/2004 11/1/2004 1/1/2005 3/1/2005 5/1/2005 7/1/2005 9/1/2005

Codered Slapper Blaster Nachi Sasser Zotob

Automated attacks create 85%

  • f their damage within the

first fifteen days from outbreak and have unlimited life time Automated attacks create 85%

  • f their damage within the

first fifteen days from outbreak and have unlimited life time

slide-26
SLIDE 26

50000 100000 150000 200000 250000 300000 350000 400000 10% Most Prevalent Vulnerabilities 90% Remaining Vulnerabilities

Mapping Vulnerability Prevalence

Vulnerability Prevalence

Individual Vulnerabilities

90% of vulnerability exposure is caused by 10% of critical vulnerabilities 90% of vulnerability exposure is caused by 10% of critical vulnerabilities

slide-27
SLIDE 27

50000 100000 150000 200000 250000 300000 350000 400000 Vulnerability Prevalence 2004 Vulnerability Prevalence 2005

The Changing Top of the Most Prevalent

50% of the most prevalent and critical vulnerabilities are being replaced by new vulnerabilities on an annual basis 50% of the most prevalent and critical vulnerabilities are being replaced by new vulnerabilities on an annual basis

slide-28
SLIDE 28

Top 10 External (Most Prevalent and Critical Vulnerabilities) as of November 15, 2005

Title Qualys ID CVE Reference External Reference Buffer overflow in Microsoft Local Security Authority Subsystem Service (LSASS) 90108 CAN-2003-0533 MS04-011 Buffer Management Vulnerability in OpenSSH 38217 CAN-2003-0693 CA-2003-24 Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability 50080 CAN-2003-0694 CA-2003-25 Microsoft Windows RPC Runtime Library Vulnerability 68528 CAN-2003-0813 MS04-012 Microsoft Windows ASN.1 Library Integer Handling Vulnerability 90103 CAN-2003-0818 MS04-007 Windows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability 90252 CAN-2005-1206 MS05-027 Writeable SNMP Information 78031 N/A N/A Unauthenticated Access to FTP Server Allowed 27210 N/A N/A SSL Server Allows Cleartext Communication Vulnerability 38143 N/A N/A

slide-29
SLIDE 29

Top 10 Internal (Most Prevalent and Critical Vulnerabilities) as of November 15, 2005

Title Qualys ID CVE Reference External Reference Microsoft Messenger Service Buffer Overrun Vulnerability 70032 CAN-2003-0717 MS03-043 Microsoft Windows RPC Runtime Library Vulnerability 68528 CAN-2003-0813 MS04-012 Microsoft Windows ASN.1 Library Integer Handling Vulnerability 90103 CAN-2003-0818 MS04-007 Microsoft Word Vulnerability Could Allow Remote Code Execution 110031 CAN-2005-0558 MS05-023 Microsoft SMB Remote Code Execution Vulnerability 90252 CAN-2005-1206 MS05-027 Microsoft Windows Print Spooler Service Remote Code Execution 90270 CAN-2005-1984 MS05-043 Microsoft MSDTC and COM+ Remote Code Execution Vulnerability 90274 CAN-2005-2119 MS05-051 Microsoft Internet Explorer Cumulative Patch Missing 100030 CAN-2005-2127 MS05-052 Graphics Rendering Engine Multiple Code Execution Vulnerabilities 90284 CAN-2005-2123 MS05-053 Adobe Acrobat Reader Remote Buffer Overflow Vulnerability 38461 CAN-2005-2470 N/A

slide-30
SLIDE 30

The Record Breakers

  • Fastest fixed Vulnerability

— Windows Plug and Play vulnerability - MS05-039

  • Longest lingering critical vulnerability

— SNMP Writeable

  • Most Prevalent critical vulnerability

— Microsoft Windows DCOM RPC

  • Most active Worm:

— Blaster

slide-31
SLIDE 31

Myth About Wireless Security

Emerging technologies, such as wireless networks are a significant security vulnerability in enterprise environments

slide-32
SLIDE 32

The Real World: Configuration Issues in Wireless Access Points

20 40 60 80 100 120 140 160 180 200 Q402 Q103 Q203 Q303 Q403 Q104 Q204 Q304 Q404 Q105 Q205 Q305 Open AP / No WEP AP with default password

slide-33
SLIDE 33

Conclusion: Wireless Security Vulnerability

The issue of security vulnerabilities in Wireless devices is significantly overrated –

  • nly 1 in nearly 20,000 critical vulnerabilities

is caused by a wireless device.

slide-34
SLIDE 34

The Laws of Vulnerabilities

#1. Half-Life

The half-life of critical vulnerabilities is 19 days on external systems and 48 days on internal systems, and doubles with lowering degrees

  • f severity

#2. Prevalence

50% of the most prevalent and critical vulnerabilities are replaced by new vulnerabilities on an annual basis

#3. Persistence

4% of critical vulnerabilities remain persistent, and their lifespan is unlimited

slide-35
SLIDE 35

The Laws of Vulnerabilities

#4. Focus

90% of vulnerability exposure is caused by 10% of critical vulnerabilities

#5. Window of Exposure

The time-to-exploit cycle is shrinking faster than the remediation

  • cycle. 80% of exploits are available within the first half-life period of

critical vulnerabilities

#6. Exploitation

Automated attacks create 85% of their damage within the first fifteen days from the outbreak and have unlimited life time

slide-36
SLIDE 36

Goal for 2006: Shortening the Half-Life

  • f Critical Vulnerabilities by 20%

48 days

25% 50% 75% 100%

96 days 144 days 192 days 240 days

2006 2005

288 days

  • Awareness
  • Prioritization
  • Security-Enforcement
  • Awareness
  • Prioritization
  • Security-Enforcement
slide-37
SLIDE 37

Common Vulnerability Scoring System (CVSS)

  • Industry Standard for common vulnerability scoring supported by CERT, Mitre,

Cisco, Symantec, Microsoft, and Qualys

  • CVSS provides an industry standard vulnerability scoring that allows

corporations to take into consideration their own security metrics

  • User customizable scoring based on three criteria

—Base - Inherent threat of the vulnerability —Temporal - Time of vulnerability’s existence —Environmental - User environment variables

  • Customer Benefits

—Prioritize remediation on critical assets —Identify risk on individual hosts

slide-38
SLIDE 38

Proposed Solutions

  • Establish enterprise vulnerability management

program

  • Network Admission Control (NAC) is a new trend to

stop threats before they affect the enterprise

  • Enforce best practices for configuration and policy

management

  • New standard for prioritization of remediation – CVSS
slide-39
SLIDE 39

Summary and Actions We Can Take

  • Significant progress on improving the remediation

cycle

  • Predefined vulnerability release schedules are

shortening the patch cycle

  • Need to counter the shrinking time-to-exploit cycle
  • Goal: Shortening the Half-Life of vulnerabilities by

20% within one year

  • Required: Your support to reach this goal
slide-40
SLIDE 40

Thank You

  • References:

— http://www.qualys.com/laws This presentation and any

future updates

— http://www.qualys.com/top10 Continuously updated

Top Ten Index of most prevalent and critical external and internal vulnerabilities

— http://www.qualys.com/top10scan Free Top Ten

Assessment Tool

— http://www.first.org/cvss Information about CVSS

  • Comments and Suggestions: tramos@qualys.com