TOP 10 Vulnerability Trends for By Nevis Labs

Similar documents
NetDefend Firewall UTM Services

Cyber Security. Our part of the journey

Big Trends in IT and how they shape Security. Gerhard Eschelbeck, CTO

AS Stallion. Security for Virtual Server Environments. Urmas Püss

MRG Effitas Trapmine Exploit Test

Microsoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Threat Centric Vulnerability Management

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

A Simple Guide to Understanding EDR

PC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications

MCAFEE FOUNDSTONE FSL UPDATE

The Laws of Vulnerabilities: Patching Progress and how to Expedite It

Trend Micro Enterprise Endpoint Comparative Report Performed by AV-Test.org

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

Latest View on the Threat of Information Security and Risk Management Trends

WEB BROWSER SANDBOXING: SECURITY AGAINST WEB ATTACKS

Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment. Orin Jeff Melnick

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

BUFFERZONE Advanced Endpoint Security

The Value of Automated Penetration Testing White Paper

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Windows Security Updates for August (MS MS06-051)

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

IPLocks Vulnerability Assessment: A Database Assessment Solution

Phishing Activity Trends Report January, 2005

Practical Patch Compliance

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Predictive malware response testing methodology. Contents. 1.0 Introduction. Methodology version 1.0; Created 17/01/2018

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Designated Cyber Security Protection Solution for Medical Devices

Trend Micro Endpoint Comparative Report Performed by AV-Test.org

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Panda Security 2010 Page 1

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Certified Ethical Hacker (CEH)

Mobility, Security Concerns, and Avoidance

Understanding Network Access Control: What it means for your enterprise

WEB APPLICATION VULNERABILITIES

ctio Computer Hygiene /R S E R ich

Q WEB APPLICATION ATTACK STATISTICS

The Threat Landscape and Security Trends. Jeremy Ward

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Prolexic Attack Report Q4 2011

Mobile App Security and Malware in Mobile Platform

Symantec Client Security. Integrated protection for network and remote clients.

Security in Cloud Environments

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

A Guide to Closing All Potential VDI Security Gaps

Adon'tbe an Adobe victim

Cisco ASA 5500 Series IPS Edition for the Enterprise

Analysis on computer network viruses and preventive measures


SE Labs Test Plan for Q Endpoint Protection : Enterprise, Small Business, and Consumer

Keys to a more secure data environment

Security Trend of New Computing Era

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012

A Security View-point

Which is better - windows defender or mcafee

McAfee Labs Threat Advisory FakeAlert System Defender

5 IT security hot topics How safe are you?

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Vulnerability Disclosure

U.S. State of Cybercrime

Product Security. for Consumer Devices. Anton von Troyer Codenomicon. all rights reserved.

SECURITY TRENDS & VULNERABILITIES REVIEW WEB APPLICATIONS

Gladiator Incident Alert

Symantec Endpoint Protection

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Offensive Technologies

Intelligent and Secure Network

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Beyond Testing: What Really Matters. Andreas Marx CEO, AV-TEST GmbH

Nebraska CERT Conference

Carbon Black PCI Compliance Mapping Checklist

IT SECURITY FOR NONPROFITS

MOBILE THREAT LANDSCAPE. February 2018

IBM Rational Software

CASE STUDY. How 16 Penetration Tests Missed A Vulnerability Which Could ve Cost One Company Over $103 Million In PCI Fines

ADVANCED THREAT HUNTING

How to build a multi-layer Security Architecture to detect and remediate threats in real time

etrust Antivirus Release 7.1

Chapter 1 B: Exploring the Network

NUIT Tech Talk: Get to Know Your Computer

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

CS 356 Operating System Security. Fall 2013

ADVANCED ENDPOINT PROTECTION TEST REPORT

Transcription:

TOP Vulnerability Trends for 28 By Nevis Labs Date: December 11, 27 Page 1

It s the last month of 27 and the time is right to look back at the year and predict the vulnerability trends for 28. A quick glance at the National Vulnerability Database reveals that there has been a disclosure of 5,877 unique vulnerabilities so far this year. Nevis Labs has been researching these and developing novel solutions to protect its customers. Based on our research and documented information, the following are our predictions for the TOP vulnerability trends in 28: ActiveX File Format Antivirus Firewall IM Virtualization VISTA Driver VOIP Mobile Page 2

1 ActiveX ActiveX-based vulnerabilities became more prevalent in 27 than ever. We have seen ActiveX vulnerabilities being published every day, without a patch -- from Microsoft Internet Explorer to popular third-party applications. There are two reasons for this: a) The popularity of the ActiveX fuzzing tools b) Exploiting ActiveX based vulnerabilities can be as easy as copying and pasting the vulnerable CLSID to the publicly available exploit template. However, we expect a 3-4 per cent reduction in ActiveX based vulnerabilities being discovered and published in 28 as compared to 27. ActiveX vulnerabilites 25 236 2 15 84 14? 5 18 23 24 25 26 27 28 National Vulnerability Database It might be worth mentioning that because of the heavy use of JavaScript obfuscation techniques, there is no perfect solution as yet from IPS/IDS vendors for web browser-based vulnerabilities. Page 3

2 File Format File-format-based vulnerabilities were one of the biggest headaches for both enterprise and security vendors in 26 and 27. You may recall that there was at least one Microsoft Office ZERO-DAY exploit being captured in the wild in the second quarter of 26? Since REAL Remote vulnerabilities are getting rare, Client-side vulnerabilities have attracted the attention of both researchers and malicious hackers. File-format vulnerabilities are one of the main sources of client-side vulnerabilities, along with the ActiveX vulnerabilities discussed above. The file formats which interest researchers the most are Microsoft Word, Excel, PowerPoint, Adobe Flash, Adobe Acrobat, Firefox, MSIE, QuickTime and RealPlayer. Additionaly, some server-side file format problems exist, such as Microsoft Exchange and IBM Lotus. We believe that file format vulnerabilities will still be popular in 28, but the focus will move from Microsoft Office to Adobe products and other popular third-party applications. Page 4

3 Antivirus Since 25, security researchers have focused on anti-virus vulnerabilities, and we have seen a dramatic increase of the AV vulnerabilities each year. However, the methodology has changed. Fuzzing makes things much easier and actually leads to massive disclosures of AV vulnerabilities. There will be again a steady increase in the number of the AV vulnerabilities being discovered in 28. More and more consumers will realize that Anti-virus software brings them both security and new vulnerabilities. Antivirus Vulnerabilities 6 5 4 3 44 52 6 2 9 24 25 26 27 National Vulnerability Database Even though there were dozens of AV vulnerabilities published, we saw very few exploits released and even proof-of-concept code is rare. Needless to say, there have been very few real world cases where AV vulnerabilities were exploited. All the same, we believe there will be more and more AV vulnerabilities used for real world hacking. Page 5

4 Firewall Since researchers and attackers are paying more attention to the security software, personal firewalls will be another important target. Pure Antivirus solutions are not sufficient anymore. Most AV vendors have introduced an Internet security suite, thus making a personal firewall a must-have for home users. We therefore expect to see more firewall vulnerabilities, and more security software vulnerabilities, in 28. Page 6

5 IM (Instant Messenger) Instant messaging applications are becoming increasingly popular. According to the IDC, there will be more than 56 million people using instant messaging by the end of 28. Unfortunately, they are increasingly becoming the target of attackers, which places enterprises at risk from hackers, worms, and legal liabilities. Related vulnerabilities focus on the image, audio, and video processing components. IM Vulnerabilities 18 16 14 12 8 6 4 2 17 11 7 24 25 26 27 Critical IM Vulnerabilities We expect a rise in IM vulnerabilities too in 28. Page 7

6 Virtualization Virtual machines are a very popular vulnerability category, especially among security researchers. Security researchers usually run unknown code within virtual machines because VM (Guest OS) is supposed to isolate the risk from their own computer (Host OS). However, the attackers are paying more attention to the virtualization technology. It s not just about evading detections, the attackers are now trying to climb out of the VM, and root the Host OS! Since people are paying more attention to this category, there will be more serious vulnerabilities uncovered here in the near future. Vmware Vulnerabilities 3 25 28 2 15 8 5 6 1 23 24 25 26 27 28 Vulnerabilities of VMware, market leader of the Virtualization Page 8

7 Vista There were 27 CVE entries after Microsoft shipped the first patch for Vista in Jan., 26. Vista looks much better when compared to other operating systems such as Windows XP. Of course, the number of disclosed vulnerabilities alone is not a good indicator. Another improvement is that there has not been a REAL Remote code execution vulnerability published for Vista thus far, which is absolutely a good record. With an increase in Vista s market share, we also expect to see an increase in attacks and vulnerabilities being exposed Vista in 28. Page 9

8 Driver Driver vulnerabilities will grow steadily and will become more prevalent in 28. Vulnerabilities are concentrated in Antivirus software, firewall software, and wireless drivers. Most of these were introduced due to the following reasons: IOCTL handler Insufficient input verification SSDT hook. Insufficient Parameters validation of certain hooked functions. The first one has been exploited widely; one of the most famous cases being the Windows secdrv.sys privilege escalation problem, which was exploited as zero-day and later reported by AV vendors. Even though most of the SSDT hook problems were reported as Denial of Service attacks, we believe that with enough research, they might be able to be turned into Local Root. Driver Vulnerabilities 35 3 25 2 15 5 31 27 12 5 24 25 26 27 Page

9 VOIP The rapid growth in use of VOIP has also caught the attention of hacker communities. The following chart explains everything: VOIP Vulnerabilities 12 8 6 4 2 6 3 24 25 26 27 Source: Quick search from the Secunia database Page 11

Mobile With more and more people using Mobile devices, the industry is paying increasing attention to mobile security. Leading vendors have released their own solutions for mobile security. However, according to a research firm s report, 73 per cent of mobile users admitted they are not always cognizant of security threats and best practices. More than 25 per cent also conceded they either hardly ever or never consider security risks. If the users do not pay attention to, the attackers will. Page 12