
Vulnerabilities you should prioritize while fixing
Every time I give my penetration test report to my client to start fixing their vulnerabilities, the first question they ask, is which one we should prioritize in our fixing ...
CVE is a very popular word in the cyber security industry. If you take any penetration test or any vulnerability assessment report, you will find a bunch of CVEs for every asset. However, does this means that all the vulnerabilities have a CVE?
According to the vulnDB database of discovered vulnerabilities, at least 500 vulnerabilities discovered and published in 2020 do not have a CVE reference. These statistics prove that not all the vulnerabilities discovered in the world have a CVE. In addition, many other zero-day vulnerabilities are discovered and exploited every day without being published to the public.
Now, if you want to know more about why this problem exists and what makes it happen? Then please just keep reading.
Before we dig deeper in explaining why this difference of CVE vs discovered vulnerabilities exists, I would like to explain a little bit what is a CVE and why is it that important in Cyber security industry. A CVE (Common Vulnerabilities and Exposures) represent an ID of a vulnerability in the MITRE database, which groups all the discovered and publicly published vulnerabilities.
CVE database references provide the organization a standardized identifier for a publicly published vulnerability. This standardization reduces drastically the time to access information about the same vulnerability over multiple platforms. In addition, this system gives vulnerability scanners vendors, the ability to test their tools and correctly see their coverage rate.
I think one of the most logical question everyone would ask now is, why do we have a difference between the number of affected CVE and the actual number of vulnerabilities in the wild?
Actually, this difference comes from multiple factors in the industry of cyber security. The first one is that vulnerability discovery is not an exact science, I mean it can take 6 months to find one vulnerability for someone, and 1 week for another researcher. And, this has nothing to do with the researcher’s skills. So, the white hat hackers that contribute to the CVE database are not always lucky to find vulnerabilities before black hat hackers. Therefore, a vulnerability could be already discovered and exploited in the wild before white hat hackers finds it and send it to CVE database.
The second most popular problem that leads to this kind of difference is the delay of MITRE organization to add a new CVE to its system. Normally, the time needed to get a “RESERVED” CVE takes around 24h.
However, in some cases, this may take more than 2 months due to technical problems. In addition, to change the status of your RESERVED CVE to PUBLIC you should write a blog post describing your vulnerability and send it back to MITRE.
This long process contributes to making the difference between the number of published vulnerabilities and declared CVEs very high.
You need to differentiate between getting a CVE for the vulnerability you have discovered and getting that CVE publishes to the public. A Reserved CVE only means that you have reserved a place in the MITRE database, but nothing will show up for the public. Therefore, CVE database team does not check the validity of a vulnerability when they just reserve a CVE for it.
Then you will have to submit a blog post URL that explains the vulnerability to the CVE Database management team so that they change its status to Published. According, to CVE database statistics, they publish around 70 vulnerabilities every day. Therefore, if we say that only 50% of the submission that they receive is actually a false positive, then they will have to test 140 vulnerabilities every day.
Personally, I think that testing all the received submissions is not feasible, as the vulnerabilities submitted could affect any software in the world, and to test each one, they will need to put in place a test environment for every app. However, the submissions that affect a product that has a proper CAN, can be tested as the test environment could be already in place.
If you have discovered a vulnerability in any product, you can easily submit it to the CVE database to get an ID. To do that, MITRE organization has put in place a process, to priorities the declaration of some vulnerabilities on others and make the process easier. Here are the steps you need to follow to correctly do that:
It is always possible to edit a CVE by replying to the same email sent by the CVE team. However, to remove a CVE, no information has been published by MITRE that deals with this problem, and there is no way to contact them apart from the one for editing.
Written by: Z. Oualid
I am a Cyber Security Expert, I have worked with many companies around the globe to secure their applications and their networks. I am certified OSCP and OSCE which are the most recognized and hard technical certifications in the industry of cybersecurity. I am also a Certifed Ethical hacker (CEH). I hope you enjoy my articles :).
secure coding Z. Oualid
Every time I give my penetration test report to my client to start fixing their vulnerabilities, the first question they ask, is which one we should prioritize in our fixing ...
Copyright © 2020 Getsecureworld.
Post comments (0)