List of SANS top 25.

The CWE/ SANS top 25 vulnerabilities are created through multiple surveys and individual interviews with developers, senior security analysts and researchers. It is a condensed list of the most common and severe software errors that can lead to serious software vulnerabilities that are typically simple to identify and exploit.?

What Is CWE/ SANS Top 25?

The CWE/ SANS top 25 most dangerous software flaws is a list of the most dangerous flaws because they let attackers gain entire control of the software, steal data and information from it, or prohibit it from functioning at all.

The SANS top 25 is a versatile starting point that can be used by almost any organization, regardless of size, industry, geography, or government/ commercial status.

The controls are prioritized to protect the organization’s infrastructure and data by strengthening the organization’s defense system through continuous automated protection and monitoring. They were developed and maintained by an international group of organizations, government agencies, and security experts.

?

How Does SANS Top 25 Work and Why Is It Important?

The SANS top 25 is a list created to give one the most bang for the buck when it comes to enhancing the risk posture against real-world risks. The Common Vulnerabilities and Exposures Team generated the list using publicly available data, CWE mappings from the National Vulnerability Database (NVD), and CVSS scores for each CWE.

A scoring algorithm was then used to determine the severity of each fault. This data-driven method can be used to generate a CWE Top 25 list of security vulnerabilities on a regular basis.?


List Of SANS Top 25?

  1. Out-of-bounds Write
  2. Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
  3. Out-of-bounds Read
  4. Improper Input Validation
  5. Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
  6. Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
  7. Use After Free
  8. Improper Limitation of a Path name to a Restricted Directory (‘Path Traversal’)
  9. Cross-Site Request Forgery (CSRF)
  10. Unrestricted Upload of File with Dangerous Type
  11. Missing Authentication for Critical Function
  12. Integer Overflow or Wraparound
  13. Deserialization of Untrusted Data
  14. Improper Authentication
  15. NULL Pointer Dereference
  16. Use of Hard-coded Credentials
  17. Improper Restriction of Operations within the Bounds of a Memory Buffer
  18. Missing Authorization
  19. Incorrect Default Permissions
  20. Exposure of Sensitive Information to an Unauthorized Actor
  21. Insufficiently Protected Credentials
  22. Incorrect Permission Assignment for Critical Resource
  23. Improper Restriction of XML External Entity Reference
  24. Server-Side Request Forgery (SSRF)
  25. Improper Neutralization of Special Elements used in a Command (‘Command Injection’)


To strengthen an organization's security posture, these vulnerabilities must be fixed. The following actions can be taken by organisations to reduce these vulnerabilities:

·?????? Implement Secure Coding Practices

·?????? Use Vulnerability Scanners

·?????? Keep Software Updated

·?????? Employee Education

·?????? Access Control

·?????? Secure File Upload

·?????? Concurrency Control

·?????? Privilege Management

·?????? Monitoring and Incident Response


In conclusion, a detailed understanding of CVE is essential for organizations looking to improve their cybersecurity process. CVE provides a standardized identifier system, allowing the industry to improve transparency and consistency in the management of potential security threats. With CVE, businesses can respond quickly and effectively to potential security incidents and limit the impact of those incidents on their systems. CWE complements CVE by tracking programming errors that lead to cybersecurity threats, providing developers valuable guidance on improving the security of their products. CVE and CWE, combined with industry-standard metrics like CVSS, provide businesses with the tools, information, and context to make informed investment decisions about potential cybersecurity solutions.


Nelson .A. Ojovbo

Security Operations Manager | IT Instructor |CSAP| CySA+|Sec+|CEH(MASTER)|AWS|ICSI|CCNA|ITIL|

1 年

Thanks for sharing Abdullateef Tunde Abdulsalam

回复

要查看或添加评论,请登录

Abdullateef Tunde Abdulsalam的更多文章

  • Types of web application attacks

    Types of web application attacks

    Introduction: The web is an indispensable part of many of the business activities your company engages in every day. It…

  • Cisco warns of new IOS XE zero-day actively exploited in attacks.

    Cisco warns of new IOS XE zero-day actively exploited in attacks.

    Cisco warned admins today of a new maximum severity authentication bypass zero-day in its IOS XE software that lets…

  • Types of Malware

    Types of Malware

    What is Malware? Malware, or malicious software, is any program or file that harms a computer or its user. Common types…

  • Newly discovered Zero-Day Attack

    Newly discovered Zero-Day Attack

    A zero-day (0day) vulnerability refers to a security vulnerability for which no mitigation or patch is available at the…

  • What is Zero-Day Attack?

    What is Zero-Day Attack?

    What is Zero-Day Attacks? "Zero-day" is an umbrella term for freshly revealed security flaws that hackers might exploit…

  • Quishing on the rise.

    Quishing on the rise.

    Quishing on the rise Cyber security researchers have discovered an extensive phishing campaign that uses QR codes as…

  • What is CVE, CWE and NVD

    What is CVE, CWE and NVD

    Introduction The Common Vulnerabilities and Exposures (CVE) program is a dictionary or glossary of vulnerabilities that…

  • Comprehensive list of Scanning tools

    Comprehensive list of Scanning tools

    Vulnerability scanners are useful tools that look for and report on any known flaws in the IT infrastructure of a…

  • Different Nmap Commands

    Different Nmap Commands

    Introduction Technology has provided humanity with a wealth of wonderful tools and multifaceted gadgets, but it has…

    1 条评论
  • Difference between Foot printing and Reconnaissance.

    Difference between Foot printing and Reconnaissance.

    In essence, footprinting is a preliminary, non-invasive phase focused on collecting publicly available information…

社区洞察

其他会员也浏览了