{"id":7366,"date":"2022-06-29T08:31:51","date_gmt":"2022-06-29T15:31:51","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7366"},"modified":"2023-04-05T12:32:42","modified_gmt":"2023-04-05T19:32:42","slug":"mitre-mapping-of-cisa-kevs-and-its-challenges","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/mitre-mapping-of-cisa-kevs-and-its-challenges\/","title":{"rendered":"MITRE Mapping of CISA KEVs and its Challenges"},"content":{"rendered":"
MITRE ATT&CK is a knowledge base that documents adversarial tactics, techniques, and procedures (TTP) and provides an evolving list of behaviors that attackers employ to compromise enterprises. By mapping the vulnerabilities to TTP, we learn how attackers exploited them and what they gained through this exploitation. This provides the security teams and researchers with a simulation of tactics used by adversaries and helps them prioritize the vulnerabilities for remediation.<\/p>\n
In this blog, we have documented how CSW\u2019s security researchers performed the MITRE\u2019s mapping of the CISA KEV catalog and have spotlighted the challenges they overcame to complete the exercise.\u00a0<\/strong><\/p>\n \u00a0 \u00a0<\/strong><\/p>\n CISA released a catalog called Known Exploited Vulnerabilities (KEV) on November 3, 2021, with a directive for federal agencies to identify and remediate oft-exploited vulnerabilities.<\/p>\n While the goal of this directive was to kick-start risk based vulnerability management and remediation in the public sector, we found that security teams are finding it challenging to prioritize these vulnerabilities due to the lack of context and multiple inadequacies in the data.<\/p>\n The CISA KEV at present is merely a \u2018table of CVEs\u2019 with hard deadlines to patch.<\/p>\n There is no threat context attached to this information that can be used to prioritize them.<\/p>\n<\/li>\n CVSS scores for many CVEs are missing, and over 11% have medium scores, which are unreliable because these are oft-exploited vulnerabilities.<\/p>\n<\/li>\n The CISA KEV also has a few CVEs not yet listed in the NVD.<\/p>\n<\/li>\n Around 50 CISA KEVs cannot be detected using popular scanners (Nessus, Nexpose, or Qualys) as the scanner plugins are missing.<\/p>\n<\/li>\n Several of the CVEs that are linked to known Ransomware gangs and Threat groups are listed as a part of the KEVs.<\/p>\n<\/li>\n<\/ol>\n In the vulnerability prioritization process, the entire list of the KEV catalog will need to be prioritized and remediated, but CISA has been updating it continuously, adding hundreds of vulnerabilities every month. For enterprises and organizations, the challenge is to identify what to remediate first.<\/p>\n To exploit a vulnerability, a threat actor performs a set of actions to achieve their goal; if we can identify the attacker\u2019s behavior in the course of exploitation, it could be used to prioritize the vulnerability.<\/p>\n Therefore, our researchers undertook an exercise to complete the MITRE mapping of all vulnerabilities in the CISA KEV, only to encounter the following challenges:<\/p>\n Missing key data<\/p>\n<\/li>\n Inaccurate data<\/p>\n<\/li>\n Wrong and misleading information<\/p>\n<\/li>\n Need for multiple resources to complete data gaps<\/p>\n<\/li>\n<\/ul>\n Firstly, most researchers refer to four different (the NVD<\/a>, CWE<\/a>, CAPEC<\/a>, and ATT&CK<\/a>) databases to map the techniques, tactics, and procedures for vulnerabilities. Each source has gaps and inconsistencies, as depicted in the following image.<\/p>\n \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/p>\n The CVE to MITRE ATT&CK mapping is based on the relationship defined by MITRE: CVE->CWE->CAPEC->ATT&CK.<\/p>\n <\/p>\n The cause of each vulnerability is a weakness (flaws, bugs, errors in software or hardware implementation, code design, or architecture that is left unaddressed). categorized under Common Weakness Enumeration (CWE) resulting in systems, networks, or hardware being vulnerable to attacks.<\/p>\n The exploitation of the flaw by a malicious actor has an attack pattern associated with it, defined by MITRE in the CAPEC dictionary.<\/p>\n The implementation of an attack pattern calls for the use of various tactics, techniques, and procedures (TTPs) by the attacker\u2014collected and defined in the ATT&CK database.<\/p>\n The following are the inconsistencies and gaps that we noticed in the MITRE resources while mapping:<\/p>\n \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/p>\n We found that 132 CVEs were not mapped to their corresponding CWEs. Our experts had to refer to reliable sources outside the NVD to fix this gap to identify associated weaknesses.<\/p>\n In a few cases where CWE information could not be found across all sources, we assessed the historical context of the KEVs and mapped them to similar weaknesses, taking their CWEs into account.<\/p>\n For example, CVE-2022-0609, a use-after-free vulnerability in Chrome animation, remains unmapped to a weakness category. However, CVE-2021-4102, a similar use-after-free vulnerability in Chrome V8, has been mapped to CWE-416 (use-after-free category). Logically, CVE-2022-0609 can then also be mapped to CWE-416.<\/p>\n We found 34 vulnerabilities from the KEV catalog mapped to obsolete and deprecated CWE IDs. Inaccurate mapping contributes to data inaccuracies and prevents security researchers from understanding attack techniques and tactics.<\/p>\n To get around this challenge, we replaced CWE IDs with membership IDs to ensure that vulnerabilities were mapped to the correct weakness enumeration.<\/p>\n For example, CVE-2021-31207, categorized under CWE-254, could be replaced by CWE-284, a part of category ID 254.<\/p>\n The number of KEVs with missing CAPEC IDs is 121. We found that replacing deprecated or obsolete CWEs with appropriate CWE IDs for a vulnerability fixes the CWE\u2013CAPEC gaps.<\/p>\n For example, CVE-2015-1130 was assigned to a deprecated CWE category ID of 254 (termed 7PK), which did not have a CAPEC ID or MITRE ATT&CK mapping. We analyzed the CVE description that stated “allows local users to obtain admin privileges via unspecified vectors\u201d and tied it to the appropriate CWE-284: Improper Access Control. We also linked it to the child node weakness category of CWE 269: Improper Privilege Management. This enabled us to add the corresponding CAPEC ID 58|122|233 and complete the MITRE ATT&CK mapping to its respective technique -T1548 – Abuse Elevation Control Mechanism.<\/p>\n Our researchers broadened their analytical scope and checked for taxonomy mappings for parent\/child CAPEC IDs and adopted child mapping for missing parent IDs.<\/p>\n For instance, CAPEC-112 has no associated MITRE ATT&CK mapping but is used for brute-force attacks. However, CAPEC-49, a similar password brute-forcing child category of CAPEC-112, has been mapped to the MITRE technique: T1110 – Brute Force. Therefore, we mapped CAPEC-112 to MITRE T1110 – Brute Force.<\/p>\n <\/p>\n For other vulnerabilities without taxonomy mappings, we used the Natural Language Processing (NLP)\u2013based association method. We created a keyword dictionary for each MITRE technique and sub-technique using the description, procedures, and platform fields where TF-IDF vectorization can be implemented to obtain a filtered set of keywords for each entity. These were then used to map the CAPEC descriptions.<\/p>\n Here is an example of how we did it:<\/p>\n For CAPEC-ID 66 (SQL injection), the attack exploits software that constructs SQL statements based on the user input. Attacker-crafted input strings force the software to construct SQL statements that perform malicious actions instead. The SQL injection results from the failure of the application to validate the input appropriately.<\/p>\n The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is used to target websites and databases that include SQL databases. Therefore, keywords such as [ \u201cT1190\u201d ] = [ \u201cPublic-facing,\u201d \u201cSMB,\u201d \u201cSQL,\u201d \u201cSQL Injection,\u201d \u2026] were searched for, resulting in the mapping of CAPEC-66 to T1190.<\/p>\n Understanding how the adversary operates is essential to effective cybersecurity. Attackers exploit each vulnerability for a purpose. It could be to gain initial access, escalate privileges, or merely conduct reconnaissance.<\/p>\n By mapping each vulnerability to the MITRE ATT&CK framework, researchers learn the purpose and impact of its exploitation within the environment, allowing them to aggregate the risk the vulnerability poses. It helps them prioritize high-impact vulnerabilities above others.<\/p>\n For example, a researcher will always prioritize a CVE that can be exploited against public-facing applications over a vulnerability exploited for data collection. From a prioritization perspective, researchers would focus on remediating vulnerabilities that attackers could potentially exploit to gain an initial foothold in the system. The first step would always be to deny access to malicious actors. This additional layer of understanding provides researchers with the context that allows them to prioritize vulnerabilities.<\/span><\/strong><\/p><\/blockquote>\n <\/p>\n However, the knowledge gaps in MITRE\u2019s sources, such as the NVD, CWE, CAPEC, and ATT&CK, are a serious handicap to security teams. The impact of these handicaps results in an inability to protect and defend networks against insidious attacks.<\/p>\n The most efficient method to reduce gaps is to automate the vulnerability mapping process of the attack patterns. Developing an automatic mapping process of MITRE ATT&CK to your vulnerabilities increases your ability to measure the impact of the CVEs. This would give security teams an accurate context of adversary behaviors and how they may attack your network.<\/p>\n<\/li>\n Additionally, this mapping should be extended to ransomware, APT groups, and threat actors. This enables better prioritization of network vulnerabilities or general exposures from an audit perspective.<\/p>\n<\/li>\n<\/ol>\n Through this research, we have highlighted the vast information gaps in vulnerability databases that give attackers a window of opportunity to stage a cyberattack. These gaps inhibit security teams from making informed decisions about prioritizing and patching critical vulnerabilities that are attractive targets for attackers.\u00a0<\/strong><\/span><\/p>\n<\/blockquote>\n Most organizations are not currently investing in the resources or have the time or the expertise required to assess over 17 database resources and find the accurate information to map the attack patterns of each vulnerability.\u00a0<\/strong><\/span><\/p>\n Our team continuously analyzes and fills the gaps in information every time CISA updates the KEVs. We have been able to help many of our customers in the public sector by highlighting these weaknesses and prioritizing them appropriately.\u00a0<\/strong><\/em><\/p>\nInadequacies of CISA KEVs<\/h2>\n
\n
\n
MITRE ATT&CK\u2019s Data Inconsistencies and Gaps<\/h2>\n
How Did We Map Missing CWEs?<\/h2>\n
Deprecated CWE IDs<\/h3>\n
CAPEC Mapping<\/h3>\n
Why Is MITRE Mapping of CISA KEVs Important?<\/h2>\n
What can MITRE do to address these gaps?<\/h3>\n
\n
\n