Amol Sarwate Director of Vulnerability Labs, Qualys Inc. 2016 State of Vulnerability Exploits.

Slides:



Advertisements
Similar presentations
Slide Heading Seminar Series: Managing IT Risk In 2010 Understanding End User Attack Vectors Brian Judd, CISSP SynerComm January 20, 2009.
Advertisements

Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Update your Software or Die! Wolfgang Kandek Qualys, Inc. RMISC 2012 Denver - May 18, 2012.
By Hiranmayi Pai Neeraj Jain
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
PREVIOUS GNEWS. 7 Patches – 3 Critical – 23 CVEs Affected – RDP, IE, Lync, Windows Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS
Patch management: increasingly a facet of effective risk management Marcus alldrick Securelondon conference, 28 jUly 2009.
PREVIOUS GNEWS. 11 Patches – 5 Critical Affecting most everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS IE, Remote Execution.
. 15 Patches / 32 Vulns – 9 Critical Affecting most everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS Windows.
PREVIOUS GNEWS. 13 Patches – 5 Critical Affecting Windows (pretty much all of them) Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS
PREVIOUS GNEWS. Oct - 8 Patches – 3 Critical - 24 CVEs MS Cumulative Security Update for Internet Explorer MS NET Framework, Remote Code.
Advanced Security Center Overview Northern Illinois University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
SiteLock Internet Security: Big Threats for Small Business.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Managing CERN Desktops with Systems Management Server (SMS 2003) Michel Christaller Internet Services Group Department of Information Technology CERN May.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
9 Patches – 2 Critical – 12 CVEs Affected – IE, Kernel, SharePoint, Remote Desktop, AD….. Other updates, MSRT, Defender Definitions, Junk Mail Filter.
PREVIOUS GNEWS. 6 Patches – 1 Critical – 22 CVEs Affected – IE. Kernel, Print, Office MS Cumulative Security Update for Internet Explorer MS
PREVIOUS GNEWS. Patches – 1 Critical Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS DNS Server, DoS –MS Kernal Mode Driver,
Security of Web Technologies: WebObjects Keshava P Subramanya
© British Telecommunications plc BT Managed Services Innovate
PREVIOUS GNEWS. 7 Patches – 3 Critical – 23 CVEs Affected – Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS Microsoft Word, Remote.
PREVIOUS GNEWS. 7 Patches – 3 Critical – 20 CVEs Affected – IE, Kernel, Visio, Silverlight Sarepoint,….. Other updates, MSRT, Defender Definitions, Junk.
PREVIOUS GNEWS. 2 Patches / 3 Vulns – 1 Critical Affecting Windows XP, Vista, 7, 2003, 2008 Other updates, MSRT, Defender Definitions, Junk Mail Filter.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Previous Gnews. 13 Patches – 8 Critical, Affects pretty much everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS SMBv2.
PREVIOUS GNEWS. July - 6 Patches – 2 Critical - 27 CVEs MS Cumulative Security Update for IE, Remote Code MS – Windows Journal, Remote Code.
PREVIOUS GNEWS. 8 Patches – 3 Critical – 19+ CVEs Affected – GDI, Hyper-V, Outlook, Office, IE, Activex, and more MS Cumulative Security Update.
PREVIOUS GNEWS. 7 Patches – 1 Critical Affecting server builds and powerpoint Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS Windows.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
PREVIOUS GNEWS. 6 Patches – 4 Critical – 11 CVEs Affected – SQL, Visual Basic, Visual Foxpro, more… Other updates, MSRT, Defender Definitions, Junk Mail.
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
. 6 Patches, 15 bug – 3 Critical, Affects 2000, XP, Srv 2003 / 8, Vista, Office Other updates, MSRT, Defender Definitions, Junk Mail Filter.
PREVIOUS GNEWS. –MS Microsoft XML Core Services, Remote Execution –MS Cumulative Security Update for Internet Explorer –MS Microsoft.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
PREVIOUS GNEWS. Jan 4 Patches – 0 Critical – 6 CVEs 9 Patches – 4 Critical – 31+ CVEs MS Microsoft XML Core Services, Info Disclosure MS
PREVIOUS GNEWS. 7 Patches – 6 Critical – 35 CVEs Affected –.NET, GDI+, IE, Defender, DirectShow MS NET Framework and Silverlight, Remote Code.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
PREVIOUS GNEWS. 16 Patches / 49 Vulns – 4 Critical Affecting most everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS Cumulative.
PREVIOUS GNEWS. 4 Patches / 5 Vulns – 3 Critical Affecting Winodow (all of them), Office, IE, SharePoint,.net Other updates, MSRT, Defender Definitions,
PREVIOUS GNEWS. Aug - 4 Patches – 1 Critical - 42 CVEs MS – IE Cumulative Security Update, Remote Code MS –.NET Framework, DoS MS –
PREVIOUS GNEWS. 2 Patches – 2 Important Affecting Windows Movie Maker, Office Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS –
PREVIOUS GNEWS. 2 Patches – 2 Critical Affecting VB and Mail Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS – Visual Basic for.
PREVIOUS GNEWS. 3 Patches – 4 Critical – 53+ CVEs Affected – Kernel, AD, SharePoint, Office, and more MS Microsoft SharePoint Server, Remote Code.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
PREVIOUS GNEWS. Aug - 9 Patches – 1 Critical - 37 CVEs MS Windows Media Center, Remote Code MS – SQL Server, Privilege Escalation MS
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Testing Exploits and Malware in an isolated environment Luca Allodi – Fabio Massacci – Vadim Kotov
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Vulnerability Expert Forum eEye Research April 14, 2010.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
PREVIOUS GNEWS. 8 Patches – 6 Critical – 19+ CVEs Affected – Kernel, AD, Exchange, Unicode, ICMP MS Security Update for Internet Explorer, Remote.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Secure Coding Techniques
All images scavenged without permission
All images scavenged without permission
Exploits and Zero-Days Exploits
Oracle E-Business Suite cybersecurity risks and mitigation
All images scavenged without permission
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Amol Sarwate Director of Vulnerability Labs, Qualys Inc State of Vulnerability Exploits

Vulnerabilities, Exploits, Exploit Kits 2016 Trends Apply Agenda

Vulnerabilities: Year over Year

Vulnerability Vulnerability is a flaw in the system that could provide an attacker with a way to bypass the security infrastructure.

Exploit An exploit, on the other hand, tries to turn a vulnerability (a weakness) into an actual way to breach a system.

Exploit Frameworks Examples An exploit, on the other hand, tries to turn a vulnerability (a weakness) into an actual way to breach a system.

Exploit Kit Exploit kits are toolkits that are used for the purpose of spreading malware. They automate the exploitation of mostly client-side vulnerabilities, come with pre-written exploit code and the kit user does not need to have experience in Vulnerabilities or Exploits.

Exploit Kit Image:

Exploit Kit

Exploit Kit Examples

Exploit Trends

#1. Most affected Vendors

#2. Only 26% Exploits targeted Operating Systems

Remote vs Local Exploits 15 Remotely Exploitable Requires Local Access

#3. Remote vs Local Exploits Remotely Exploitable (80%) Requires Local Access

Remote vs Local Exploits Requires Local Access REMOTELOCAL CVE : Adobe Flash Player APSB15-06 Multiple Remote Code Execution Vulnerabilities CVE : Foxit Reader CVE Local Privilege Escalation Vulnerability CVE : Microsoft Office CVE Remote Code Execution VulnerabilityCVE : Lenovo System Update 'SUService.exe' CVE Local Privilege Escalation CVE : Microsoft Windows CVE Telnet Service Buffer Overflow Vulnerability CVE : Microsoft Windows CVE Local Privilege Escalation Vulnerability CVE : Microsoft Windows HTTP Protocol Stack CVE Remote Code Execution CVE : Microsoft Windows Kernel 'Win32k.sys' CVE Local Privilege Escalation CVE : PHP CVE Use After Free Remote Code Execution VulnerabilityCVE : SoftSphere DefenseWall Personal Firewall 'dwall.sys' Local Privilege Escalation CVE : ISC BIND CVE Remote Denial of Service VulnerabilityCVE : Ubuntu Linux CVE Local Privilege Escalation Vulnerability CVE : Oracle Java SE CVE Remote Security VulnerabilityCVE : Microsoft Windows CVE Local Privilege Escalation Vulnerability CVE : MikroTik RouterOS Cross Site Request Forgery VulnerabilityCVE : libuser CVE Local Privilege Escalation Vulnerability CVE : Mozilla Firefox CVE Security Bypass VulnerabilityCVE : Microsoft Windows Kernel Use After Free CVE Local Privilege Escalation Vulnerability CVE : Symantec Endpoint Protection Manager CVE Arbitrary File WriteCVE : Microsoft Windows Kernel 'Win32k.sys' CVE Local Privilege Escalation CVE : WordPress Aviary Image Editor Add-on For Gravity Forms Plugin Arbitrary File CVE : FortiClient CVE Multiple Local Information Disclosure Vulnerabilities

Remote vs Local Exploits Remotely Exploitable Requires Local Access

#4. Lateral Movement

Lateral Movement HIGH LATERAL MOVEMENTLOW LATERAL MOVEMENT CVE : IBM Domino CVE Arbitrary Code Execution Vulnerability CVE : Apple Safari CVE Information Disclosure Vulnerability CVE : Microsoft Office CVE Remote Code Execution Vulnerability CVE : FortiClient CVE Multiple Local Information Disclosure Vulnerabilities CVE : Microsoft Windows HTTP Protocol Stack CVE Remote Code Execution Vulnerability CVE : Apache ActiveMQ CVE Directory Traversal Vulnerability CVE : Oracle Java SE CVE Remote Security Vulnerability CVE : Elasticsearch Groovy Scripting Engine Sandbox Security Bypass Vulnerability CVE : Samba 'TALLOC_FREE()' Function Remote Code Execution Vulnerability CVE : ManageEngine ServiceDesk Plus 'CreateReportTable.jsp' SQL Injection Vulnerability CVE : VMware vCenter Server CVE Remote Code Execution Vulnerability CVE : Movable Type CVE Unspecified Local File Include Vulnerability CVE : Lenovo System Update 'SUService.exe' CVE Local Privilege Escalation Vulnerability CVE : ManageEngine Desktop Central CVE Password Reset Security Bypass Vulnerability

50% of Vulnerabilities had minimal Lateral Movement Examples: CVE IBM Domino CVE Arbitrary Code Execution Vulnerability CVE Microsoft Office CVE Remote Code Execution Vulnerability CVE Microsoft Windows HTTP Protocol Stack CVE Remote Code Execution Vulnerability CVE Microsoft Windows OpenType Font Driver CVE Remote Code Execution Vulnerability CVE Oracle Java SE CVE Remote Security Vulnerability Remote + High Lateral Movement

#5. Exploits for EOL Applications

Exploits for EOL Applications

#6. Only 7% of Vulnerabilities in 2015 had an associated Exploit

Exploit Kits of CVEVULNERABILITYEXPLOIT KIT CVE Adobe Flash Player Remote Code Execution Vulnerability (APSB15-04)Hanjuan, Angler, CVE Adobe Flash Player Remote Code Execution Vulnerability (APSB15-03)SweetOrange, Rig, Fiesta, Nuclear, Nutrino, Magnitude, Angler CVE Microsoft Internet Explorer Cumulative Security Update (MS15-065) RIG,Nuclear Pack, Neutrino, Hunter,Angler CVE Adobe Flash Player Remote Code Execution Vulnerability (APSB15-03)Magniture, Angler CVE Adobe Flash Player Multiple Remote Code Execution Vulnerabilities (APSB15-06)Fiesta,Angler, Nuclear, Neutrino, Rig, Magnitude CVE Adobe Flash Player Security Update (APSB15-02)Angler CVE Adobe Flash Player Remote Code Execution Vulnerability (APSB15-05)Angler CVE Adobe Flash Player and AIR Multiple Vulnerabilities (APSB15-19)Nuclear Pack CVE Microsoft Font Driver Remote Code Execution Vulnerability (MS15-078) Magnitude CVE Adobe Flash Player Multiple Vulnerabilities (APSB15-18) Hacking Team, Nutrino, Angler, Magnitude, Nuclear, RIG, NULL Hole CVE Adobe Flash Player and AIR Multiple Vulnerabilities (APSA15-03, APSB15-16)Neutrino, Angler, Magnitude, Hanjuan, NullHole CVE Microsoft Font Drivers Remote Code Execution Vulnerabilities (MS15-044) Angler CVE Adobe Flash Player Buffer Overflow Vulnerability (APSB15-14) Magnitude, Angler, Rig, Neutrino CVE /3104 Adobe Flash Player and AIR Multiple Vulnerabilities (APSB15-11) Magnitude, Angler, Nuclear CVE Adobe Flash Player and AIR Multiple Vulnerabilities (APSB15-09) Angler, Nuclear, Rig, Magnitude CVE Adobe Flash Player Remote Code Execution Vulnerability (APSB15-05) Nuclear,Angler, Neutrino, Magnitude

#7. Less than 1% of Vulnerabilities had an associated Exploit Kit

Applying Exploit knowledge Next Week: Create inventory of : –Applications with weaponized Exploit packs –EOL Applications and EOL Operating Systems –Vulnerabilities with working exploits –Vulnerabilities that can be remotely compromised Next Month: –Upgrade EOL applications –Patching all vulnerabilities with Exploit packs and exploits Next Quarter: –Automatic inventory and alerting –Debate if most exploited applications, like Flash, are required for business.

Amol Director of Vulnerability Labs, Qualys Inc. Thank You