{"id":7617,"date":"2020-07-19T04:19:55","date_gmt":"2020-07-19T11:19:55","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7617"},"modified":"2023-07-10T14:48:02","modified_gmt":"2023-07-10T21:48:02","slug":"how-safe-are-web-proxy","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/how-safe-are-web-proxy\/","title":{"rendered":"How Safe are Web Proxy?"},"content":{"rendered":"\t\t
With the Corona pandemic devastating lives around the world, cybercriminals and threat actors have joined the fray to take advantage of this situation. <\/span><\/strong><\/p><\/blockquote>
Today, the reliance on applications such as web proxy, remote conferencing, VPNs, etc. are at an all-time high which is\u00a0yet another reason for threat actors to work overtime to exploit vulnerabilities.<\/span><\/p>
We recently released an in-depth research report called Cyber Risks in Remote Working series where we examined popular web proxy applications used\u00a0by employees\u2019 world over.<\/p>
Key findings<\/strong><\/h3>
The report provides an in-depth study of web proxy applications and the inherent vulnerabilities that exist within them.<\/p>
- 13\u00a0CVEs are weaponized<\/strong><\/span><\/li>
- 5\u00a0CVEs have RCE and Privilege Execution<\/strong><\/span><\/li>
- Scanners such as Nessus, Nexpose, Qualys have missed\u00a02\u00a0vulnerabilities each<\/strong><\/span><\/li><\/ul><\/blockquote>
Vulnerabilities in Web Proxies<\/strong><\/h3>
- From 2010 to 2020, 121 <\/span><\/strong>vulnerabilities have been detected in popular web proxy applications. From this, 13 <\/span><\/strong>vulnerabilities have been weaponized.<\/li><\/ul>
<\/p>
\u00a0<\/p>
- From among the weaponized vulnerabilities, 3<\/strong><\/span> have RCE (remote code execution) capabilities, 2<\/span><\/strong> have privilege execution.<\/li>
- \u00a022 <\/span><\/strong>vulnerabilities are deemed critical with CVSS2 score >= 9.<\/li><\/ul>
Vulnerabilities in Vendors<\/strong><\/h3>
- Forcepoint has 10 <\/strong><\/span>weaponized vulnerabilities and 41<\/span><\/strong> vulnerabilities waiting to be weaponized and 1 <\/strong><\/span>is associated with RCE (Remote code execution). 2 <\/strong><\/span>vulnerabilities are critical in priority and will need to be fixed immediately.<\/li>
- Symantec has 7<\/strong><\/span> weaponized vulnerabilities and 82 <\/span><\/strong>vulnerabilities that can be weaponized, and 6<\/span><\/strong> vulnerabilities are associated with RCE. Symantec also has 21 <\/strong><\/span>critical vulnerabilities \u2013 the highest number of CVEs among the vendors.<\/li><\/ul>
<\/p>
Weaponization Trends<\/strong><\/h3>
- The weaponization of web proxies increased around 2015 and spiked in 2018<\/li><\/ul>
<\/p>
\u00a0<\/p>
Fixing these vulnerabilities is critically essential because leading scan systems such as Nessus, Nexpose, and Qualys have missed critical CVEs in web proxies.<\/span><\/strong><\/p><\/blockquote>
Count of vulnerabiliies missed by popular scanners<\/span><\/strong><\/p>
\u00a0<\/td> Nessus<\/strong><\/td> Nexpose<\/strong><\/td> Qualys<\/strong><\/td><\/tr> Cisco<\/strong><\/td> 2<\/td> 2<\/td> 2<\/td><\/tr> Total<\/strong><\/td> 2<\/strong><\/td> 2<\/strong><\/td> 2<\/strong><\/td><\/tr><\/tbody><\/table> CWS\u2019s report is accompanied by a helpful appendix of a list of CVEs that need to be fixed immediately and with scanners not detecting these vulnerabilities must be are addressed immediately.<\/p>
Download the whitepaper\u00a0Cyber Risk in Web Proxies<\/a><\/strong><\/p>