{"id":7635,"date":"2020-07-14T04:35:51","date_gmt":"2020-07-14T11:35:51","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7635"},"modified":"2023-07-10T14:36:31","modified_gmt":"2023-07-10T21:36:31","slug":"how-safe-are-your-tech-stacks","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/how-safe-are-your-tech-stacks\/","title":{"rendered":"How Safe are your Tech Stacks?"},"content":{"rendered":"\t\t
T<\/b><\/span>his April, Cognizant fell prey to a nasty ransomware attack whose ripple effect has shaken the world.\u00a0<\/span><\/span><\/p> Cognizant has over hundreds of Fortune 500 companies as its customers and this recent attack finds them literally over the barrel, scrambling for cover. The full impact of this attack will be known in the months to come\u2026 though the company expects to lose between $50 Million to $70 Million to cover legal, consulting, security restoration and remediation work.<\/span><\/strong>\u00a0<\/span><\/p><\/blockquote> The fact that this ransomware attack happened right after employees started working remotely is significant!<\/p> Remote working has become the new normal in the past months and might just be a new working model for many companies in the future.\u00a0<\/p> A recent white paper (Cyber Risk in working remotely<\/a>) released by Cyber Security Works paints a disturbing picture of the vulnerabilities that exist in popular tech stacks used today.\u00a0<\/p> Key Findings<\/b><\/big><\/p> The report provides an in-depth analysis of popular tech stacks and their inherent vulnerabilities –\u00a0<\/p> Vulnerabilities in Tech Stacks<\/b><\/big><\/p> We examined an overall 4849<\/strong> <\/span>vulnerabilities in tech stacks (encompassing VPN, Access Service, Database, Web Proxy, Web Gateway, CRM, Business Intelligence, Backup & Storage, Online conference).\u00a0<\/p><\/li><\/ul> <\/p> Out of these, over 543<\/strong><\/span> CVEs have been weaponized, and 6<\/strong> <\/span>CVEs are vulnerable to ransomware!<\/p><\/li> We found the maximum number of vulnerabilities in Database (1449<\/strong><\/span>), Online Conference (877<\/strong><\/span>), and Backup & Storage technologies (745<\/strong><\/span>).\u00a0<\/p><\/li><\/ul> <\/p> Out of these, remote code execution (RCE) is possible for 45<\/strong> <\/span>vulnerabilities in Backup and Storage technologies and for 25<\/strong> <\/span>vulnerabilities in Database.\u00a0<\/p><\/li> A total of 473<\/strong> <\/span>critical vulnerabilities were found among all the technologies that were examined. Of these Online Conference solutions has over 220<\/strong> <\/span>vulnerabilities, followed by Backup & storage which has 108<\/strong> <\/span>vulnerabilities.<\/p><\/li> The trend in weaponization also gave many insights. For one thing, the weaponization rates have been increasing considerably since 2015. In 2017, 47<\/strong> <\/span>vulnerabilities became weaponized (out of 803<\/strong> <\/span>CVE in total).\u00a0<\/p><\/li><\/ul> <\/p> Vulnerabilities undetected by popular scanners<\/b><\/big><\/p> Popular scanners like Nessus, Nexpose, and Qualys have missed around 102<\/strong><\/span>, 158<\/strong><\/span>, and 131<\/strong> <\/span>vulnerabilities.<\/p> Unique vulnerabilities that can be executed remotely like the below-given list were missed by all three scanners.<\/p> Here is a count of CVEs that were missed by scanners –<\/p> Threat actors have always exploited the inherent vulnerabilities in a software program. A weak code is all that is needed for them to penetrate and steal data. The current circumstances present prime opportunities for them to breach security and spread mayhem. Tech giants like Cognizant have already taken a hit and more will follow in the months to come – if these vulnerabilities are not fixed.<\/p> The only way forward in the present situation is to understand the threat and not confuse the lack of weaponization of vulnerability with safety and be complacent about it. \u00a0<\/small><\/span><\/big><\/p>Technology<\/th> Nessus<\/strong><\/th> Nexpose<\/strong><\/th> Qualys<\/strong><\/th><\/tr><\/thead> VPN<\/strong><\/td> 6<\/td> 12<\/td> 8<\/td><\/tr> RAS<\/strong><\/td> 5<\/td> 8<\/td> 5<\/td><\/tr> Database<\/strong><\/td> 23<\/td> 49<\/td> 32<\/td><\/tr> Web Proxy<\/strong><\/td> 2<\/td> 5<\/td> 3<\/td><\/tr> Web Gateway<\/strong><\/td> 1<\/td> 12<\/td> 3<\/td><\/tr> CRM<\/strong><\/td> 5<\/td> 6<\/td> 5<\/td><\/tr> BI<\/strong><\/td> 4<\/td> 2<\/td> 5<\/td><\/tr> Backup & Data Storage<\/strong><\/td> 44<\/td> 46<\/td> 33<\/td><\/tr> Online Conference<\/strong><\/td> 10<\/td> 22<\/td> 8<\/td><\/tr> Total<\/strong><\/td> 100<\/strong><\/td> 162<\/strong><\/td> 102<\/strong><\/td><\/tr><\/tbody><\/table>