Edition 12: Let's Think Adjacent Risks When Analyzing Vulnerability Data

Edition 12: Let's Think Adjacent Risks When Analyzing Vulnerability Data

The steps to perform a vulnerability analysis comes with many elements. When we usually view a vulnerability, it's called Critical, High, Medium, and Low. In today's landscape, we have to ingest actual risk and determine what's exploitable. There are several attack vectors, adjacent systems, and downstream risks that are sometimes overlooked. If we were to examine a typical exploit, the data might seem straightforward. Still, some adjacent risks and CVEs may need attention when thinking holistically. One of the steps often used is to view the CVSS vector to determine the vulnerability nature. Each metric is scored in different ways.

Reference: https://www.first.org/cvss/specification-document

Here is a vulnerability to analyze

Tenable SecurityCenter 5.22 - 6.0.0 Access Control Bypass (TNS-2023-17)

CVE: CVE-2023-25690??Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Synopsis

An application installed on the remote host is affected by multiple vulnerabilities.

Description

According to its self-reported version, the Tenable SecurityCenter application installed on the remote host is running 5.22 to 6.0.0 and is therefore affected by an Apache vulnerable which could result in bypassing of access controls.

Solution

Apply the security patch referenced in the vendor advisory.

Analysis: Since this is an access control vulnerability, the application can provide open authentication to attacks. If there is a backend database, the environment has to consider SQL attacks, and whether the database has private data attached – if so, we could also be susceptible to a data breach. Viewing the vulnerability seems simple, but our analysis proves otherwise. Do we have any attached CVEs?

Key Takeaways: Perform an in-depth analysis beyond the vulnerability description


CVE Details: https://www.cvedetails.com/product/34965/Microsoft-Windows-Server-2016.html?vendor_id=26

CVSS Definition: https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System


For more information concerning cybersecurity, purchase a copy of "The Cybersecurity Mindset" at www.dewaynehart.com; and please subscribe to my YouTube Channel at: https://www.youtube.com/@chiefofcybersecurity

Press Release: https://www.einpresswire.com/sources/u462154

Author: https://www.dewaynehart.com/

Business: https://www.semais.net

Dewayne Hart


"We Are Only Safe As Our Mindset"


#India?#Innovation?#Management?#HumanResources?#DigitalMarketing?#Technology?#Careers?#cybersecurity?#informationsecurity?#sansinstitute?#sans?#technologytransformation?#military?#ciso?#socialmedia?#humanresources?#hrcommunity?#talentacquisition?#ukraine



Forbes Technology Council

North Carolina Agricultural and Technical State University?George Lynch?Lindsay LaBennett?Jazmine Harrison?Ponce DeLeon Tidwell, Jr?Herb Gray?Harold Cogdell?Joel Wiggins?Ken Burton?Rosalind Mitchell, MA, LPC, NCC?Todd V. Mason, MS Ed., CLF ,?Tonya Blackwell, ASQ CQA?Jeff Lundy?Derwin Peterson?Heyward Damon?Terry L. Cyrus?Travis P. Jackson?Ray Leonard Jr?????Christy Dunston?Valerie H.?Aleea McNabb?Ryan Smith?Donna Davis?Danita Rucks Oliver

??Umar aka Chris Carter Mercy Komar, CIC, CyRM, MLIS, CCIS Gabrielle B. SANS InstituteSANS Technology InstituteSANS Cyber DefenseBlack Hills Information SecurityHBCU HeroesTracey PennywellCybersecurity and Infrastructure Security AgencyCyber Defense MagazineBlack Enterprise MagazineCyber MagazineTop Cyber News MAGAZINECyber Protection MagazineSecurity MagazineInfosecurity MagazineCyber InsightUnited States Cybersecurity MagazineOfficial Cyber Security SummitTrusted Computing GroupNational Speakers AssociationCyber Security TribeNational Cyber Security News TodayNational Security AgencyVeda Woods, CISM, CCISO, F.ISRMFrantz Honoreauctus agencyA5 EventsNikki YepSPARGO, Inc.Authority MagazineKPMG Cyber Security ServicesThe Hacker NewsLinkedInUS ArmyCyber-DuckCYBERSEC - European Cybersecurity ForumCybersecurity and Infrastructure Security AgencyCyber News GroupCISOCISO2CISOChuck Brooks?Mike Miller????? David Meece ?????Cyber Crime Junkies Podcast???????Dr. Chanel Suggs - Duchess of Cybersecurity?????? Gerald Auger,?GoogleAmazon?Ph.D.?Cyber Security Market : Latest Innovation & Industry Insights?Darren Argyle FCIIS?Shamane Tan?Deidre Diamond?Noureen N.?Victoria Beckman?Tyler Cohen Wood CISSP?Dr Magda Chelly?Dan Lohrmann?Kavya Pearlman ?? Safety First ???Diana Waithanji?Ludmila Morozova-Buss?Chris Hughes ?????Christopher Krebs?AFCEA International?(ISC)2?CompTIA?CNN?CrowdStrike?SANS Cyber Defense?Cyber Risk Leaders Book?Cyber Castle?CYBERSEC - European Cybersecurity Forum?Cyber Security NewsSimplilearn?LinkedInAFCEA InternationalNational Institute of Standards and Technology (NIST)

Dewayne Hart CISSP, CEH, CNDA, CGRC, MCTS

CEO at Secure Managed Instructional Systems (SEMAIS) a SDVOSB l Official Member @ Forbes Tech Council | Author of "The Cybersecurity Mindset" l Keynote Speaker l Cybersecurity Advisory Board Member @ EC-Council

1 年

This was a great newsletter. I think that sometimes we overlook the simple facts of how risks operate. Just imagine leaving your front door open. This would provide access to more than your home. This relates to cyber because vulnerabilities are attached to additional issues. Keep the world safe!

回复
Jamie G.

Digital Artist, Web Developer & Programmer

1 年

Thank you for the invitation! Cybersecurity is absolutely critical in this internet age.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了