vFeed Newsletter November 2024

Zetafence acquires vFeed IO to vastly expand Threat Intelligence & Cloud Vulnerability insights with correlated feeds across

We are happy and thrilled to announce that vFeed IO has joined forces with Zetafence to  expand Threat Intelligence and Vulnerability Management Offerings.

Over the next few weeks, we will work on streamlining update processes, improving development processes, adding more mapper sources for our feed aggregation, leveraging data semantics to recommend threat insights to customers such as advisories, etc.

Core engineering teams will be working on integrating vFeed threat vulnerabilities to correlate with attack surface vulnerabilities across clouds, and Kubernetes deployments to provide unified infrastructure and deployment threat intel across platforms.

For more information, please visit the link below.

CVEDescriptionCVSS 3 BaseDate PublishedWeaknessVersions AffectedReferences
CVE-2024-42450Versa Director uses PostgreSQL (Postgres) to store operational and configuration data. It is also needed for the High Availability function of the Versa Director. The default configuration has a common password across all instances of Versa Director.102024-11-19 18:15:21CWE-798 Use of Hard-coded CredentialsVersa Director 22.1.4 versionhttps://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3
CVE-2024-115901000 Projects Bookstore Management System /forget_password_process.php. The manipulation of the argument un m leads to sql injection. The attack may be launched remotely9.82024-11-21 13:15:06CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)/forget_password_process.php.https://github.com/1ighttack/CVE/issues/1
CVE-2024-52401WordPress: Hacklog DownloadManager allows Upload a Web Shell to a Web Server CSRF9.62024-11-19 17:15:55CWE-352 Cross-Site Request Forgery (CSRF)DownloadManager Plugin <= 2.1.4 is vulnerablehttps://patchstack.com/database/vulnerability/hacklog-downloadmanager/wordpress-hacklog-downloadmanager-plugin-2-1-4-csrf-to-arbitrary-file-upload-vulnerability?_s_id=cve
CVE-2024-10094Pega Platform versions 6.x to Infinity 24.1.1 are affected by an issue with Improper Control of Generation of Code9.12024-11-20 15:15:08CWE-94 Improper Control of Generation of Code (‘Code Injection’)Pega Platform versions 6.x to Infinity 24.1.1https://support.pega.com/support-doc/pega-security-advisory-d24-vulnerability-remediation-note
CVE-2024-10898WordPress: Contact Form 7 Email Add on plugin is vulnerable to Local File Inclusion in all versions 1.98.82024-11-21 11:15:24CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)Up to (including),1.9https://www.wordfence.com/threat-intel/vulnerabilities/id/d82efaa3-ea61-476c-ad1a-60585450c63a?source=cve
CVE-2024-52451WordPress: Cross-Site Request Forgery (CSRF) vulnerability in Aaron Robbins Post Ideas allows SQL Injection8.22024-11-20 12:15:22CWE-352 Cross-Site Request Forgery (CSRF)Post Ideas Plugin <= 2https://patchstack.com/database/vulnerability/post-ideas/wordpress-post-ideas-plugin-2-csrf-to-sql-injection-vulnerability?_s_id=cve
CVE-2024-10855WordPress: Image Optimizer, Resizer and CDN Sirv plugin vulnerable to unauthorized modification of data that can lead to a denial of service due to insufficient validation on the filename parameter8.12024-11-20 7:15:08CWE-639 Authorization Bypass Through User-Controlled KeySirv <= 7.3.0https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ec09e5-4994-4d23-bf8e-26b64d5303fa?source=cve
CVE-2024-48990Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable7.82024-11-19 18:15:22CWE-427 Uncontrolled Search Path ElementBefore version 3.8https://www.qualys.com/2024/11/19/needrestart/needrestart.txt

Vulnerability Trends

How did November Vulnerability trend after October Cybersecurity Awareness Month?

The first histogram under each platform shows the High count, and second the Medium count.

Curiosity Questionnaire of the Month

We got asked a number of curious questions during the month, and thought we should share those insights here.

What vulnerability data format should I adhere to if I start off now? Any standards?

Depends on your use case. Don’t we shudder at that answer? But there is some meaning to it. True, you can start with existing CVE, CVSS, CPE formats that are widely adopted and reported. Many SBOM tools work back with those, although SBOMs have now moved towards System Package Data Exchange (SPDX), which is an open standard capable of representing systems with software components as SBOMs. 

There is also this OpenVEX is an open source specification, library, and suite of tools designed to enable software users to eliminate vulnerability noise and focus their security efforts on vulnerabilities that pose an immediate risk.

Structured Threat Information eXpression (STIX) is another format used in Cyber Threat Intelligence (CTI) reporting to describe and exchange information about threats, vulnerabilities, attacks, and defenses. STIX is designed to enable organizations to share actionable intelligence in a standardized format, facilitating better threat detection, prevention, and response.

That said, a modern approach is to have a customizable JSON schema for compatibility across tools, such as the one defined by Common Security Advisory Framework (CSAF).

Why are there so many vulnerability data formats out there? Why are those hard to change?

That’s caused by evolution due to diversification. Vulnerabilities are defined and used by various stakeholders such as developers, security teams, auditors, threat analysts, and vendors – each with unique requirements. And hence, each has their representation including STIX, CVSS, EPSS, SBOM, CPE, etc.

Such Vulnerability data must work with a variety of tools – SIEMs, vulnerability scanners, patch management systems, threat intelligence platforms, each of which may each support different formats.

Organization network effects resist changes from well adopted CVE, CVSS due to deeply integrated ecosystem needs.

How do enterprises narrow down on specific vulnerabilities that must be quickly addressed in their environment?

Focus on the 4 Rs:

  1. Relevance or context of what you possess and what possibly affects your environment. Match vulnerabilities to PURLs e.g., SBOM, package manifests. environments like AWS, on-prem, or specific applications, etc.
  2. Risk: CVSS base scores, Check exploit maturity (EPSS), and impact study of potential damage to confidentiality, integrity, availability
  3. Reach (exposure): Privilege Level such as IAM, admin services, Attack path analysis for lateral movement or privilege escalation, Asset Criticality: Core systems, databases, or components housing sensitive data, and sensitivity
  4. Remediation involves identifying what is relevant, that which is exploited, and going after those

High Risk + High Relevance + High Reach → Immediate action

High Risk + High Reach, but Low Relevance → Monitor but deprioritize

Low Risk + Low Reach, but High Relevance → Schedule patching

Why do I see so many updates to vulnerability EPSS score percentiles?

EPSS percentiles change often because it is designed to provide dynamic and data-driven predictions about the likelihood of a vulnerability being exploited in the wild. These updates reflect the constantly changing threat landscape based on the availability of new information. EPSS scores are generated using machine learning models that analyze vast amounts of data.

Is there something like a “vulnerability hangover”?

A “vulnerability hangover” is a feeling of discomfort, self-doubt, and regret that may occur due to uncertainty or anguish. In the cybersecurity world, it is informally thought to describe any lingering aspects or impacts of a major vulnerability long after its initial disclosure. This could occur due to uncertainty of systems that may be left unpatched, neglect of dependency chains, or compliance fallout. In other words, Security Debts.

To mitigate, constantly look for vulnerabilities that are relevant and poses higher risks in your specific environment, use scores beyond CVSS such as EPSS, utilize Common Attack Pattern Enumeration and Classification (CAPEC) framework to understand exploitation risks and mitigation strategies.

CSA Vulnerability Data Working Group published “Top Concerns with Vulnerability Data“, this month, and it’s quite a good read. We summarize some of those from our perspective.

Current State of Vulnerability Data

NVD is Overwhelmed: The National Vulnerability Database (NVD) has been struggling to keep up with the rapid and ever increasing reports of vulnerabilities. A combination of factors cause this including the growth of technology, the exploitation of system weaknesses, and a lack of resources. In 2024, the NVD even had to temporarily halt publishing CVEs due to this overwhelming influx.

Inadequate handling of complexity: Existing vulnerability data formats such as CVE and CVSS are not equipped to handle the increasing complexity of vulnerabilities. They are unable to accurately assess and prioritize threats, leading to potential security risks.

Current Challenges – CVE

CVE format and system struggles to keep pace with the rapidly evolving cybersecurity landscape. It is limited by granularity and slow assignment processes, once suitable for fewer vulnerabilities, have become major pain points.  Some of the challenges in current landscape includes:

  • Data Quality and Fidelity
  • Perverse Incentives to not Create CVEs
  • Finding Relevant Vulnerability Data
  • Notifying Project Maintainers
  • Lack of Interoperability
  • Resolving Disputes
  • Complexity of Reporting Vulnerabilities
  • Handling False or Low-Quality Reports
  • Increasing Number of CVEs Every Year

Current Challenges – CVSS

Analyzing the severity of vulnerabilities is crucial to consider scoring systems that weigh the vulnerability threat levels based on CVSS. However, CVSS contains glaring disadvantages in its framework that have been overlooked because there are little to no alternatives that aim to build and improve on the CVSS framework, leading to its continued perception as the standard of severity scoring systems. Some of the challenges in current landscape includes:

  • Inability to Prioritize Risk
  • Limited Awareness of Context
  • Static Scoring System

Alternatives to CVSS: Exploit Prediction Scoring System (EPSS), Stakeholder-Specific Vulnerability Categorization (SSVC) framework, Vulnerability Prioritization System (VPR).

Summary

Traditional vulnerability systems like CVE and CVSS struggle to keep pace with the rapidly evolving threat landscape. This is where AI and ML can help revolutionize vulnerability management by automating data enrichment, improving interoperability, and providing dynamic, context-aware assessments.

Click here to schedule your demo with the vFeed today!