DSBP - System Vulnerabilities (Lesson)

System Vulnerabilities

What are Vulnerabilities?

In this lesson, you will learn about various system vulnerabilities.

Did you know that cybersecurity professionals spend approximately 30% of their time performing system vulnerability testing, in order to prevent attacks before they happen?

A vulnerability is a security flaw, glitch, or weakness found in software code that could be exploited by an attacker, which is a threat source. Vulnerabilities exist in technology products, including the code of operating systems, software applications, and even the firmware for physical devices like webcams.

That’s right, your webcam, if your device is hacked by a malicious actor, can literally become a window to your home or office! Scary, huh?

Famous Vulnerabilities

In 2014, a serious vulnerability was given the name Heartbleed for a write-up that was meant to help clarify the risk.  Since then, it has become a trend to assign fun names to vulnerabilities and some people believe this helps with getting attention to fixing those issues. 

Heartbleed Bug

The Heartbleed Bug in the Open SSL software allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software.

Heartbleed bug

Log4J

Log4J is a small open-source Java program used worldwide across software applications and online services. This program is used by developers to keep track of what happens in their software applications or online services. It is basically a huge journal of the activity of a system or application. This activity is called logging and it is used by developers to keep an eye out for problems for users. Log4J vulnerability requires very little expertise to exploit. This makes it potentially the most severe computer vulnerability in years. If fixes are not applied, attackers can break into systems, steal passwords and logins, extract data, and infect networks with malicious software.

Log4J Vulnerability

Print Nightmare

Print Nightmare is a flaw in the print spooler service in ALL versions of the Windows OS. It allows Remote Code Execution attacks. It is a bug that means a domain user (once they have been authenticated against the remote system) can remotely run code on a Microsoft Windows system as the local SYSTEM user. Just as if you added them as a legitimate user, yikes!

Print Nightmare

Common Vulnerabilities and Exposures (CVE) Database

Let’s say you want to use a new software app but you are not sure whether it is secure. What is the best way to research this? Can you rely on a Google search and looking at what other users have to say? How do you know if a product is secure and will not expose you to malicious actors?

No, you cannot rely on a Google search! However, several organizations, including the US government, cooperate to maintain the Common Vulnerabilities & Exposures (CVE) database. The CVE is a research database to keep track of the known vulnerabilities that exist in operating systems, applications, and even the firmware for physical devices like webcams.

The CVE includes information about how to “fix” the vulnerability, but this usually means you can only MITIGATE the attacks, not STOP them.  That’s because it is impossible to stop all possible attacks and breaches.  The intent of digital devices is to share, move, modify, and save data so there is no way to make it completely safe unless we unplug the computer and store it in a locked closet. 

Here is a quick review of the term “mitigate” -- minimize the risk and/or lessen the force or intensity of something unpleasant.

The CVE database provides:

  • an easy way to share data about product issues;
  • a common baseline for comparing products;
  • a source for ways to mitigate the impact of vulnerability.

When a vulnerability is found in a product, it is given a unique CVE identifier number and added to the database of known vulnerabilities.  The CVE listing includes the CVE #, vulnerability details, how to mitigate the threat, and
a score indicating the severity, from 0 = not too risky to 10 = this is very bad! The MITRE organization maintains this research database to keep track of the known vulnerabilities that exist in operating systems, applications, and even the firmware for physical devices like webcams. Browsing through the CVE database makes for some interesting reading!

There is a National Vulnerability Database (NVD), maintained by Cybersecurity and Infrastructure Security Agency (CISA). It provides details on each recorded CVE vulnerability.

Remote code execution vulnerability in Remote Desktop Manager.

Vulnerabilities Exploited

What happens when vulnerabilities are not detected on time? Malicious actors can exploit such vulnerabilities!

Exploit is a specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access. 

The vulnerability is the opening and the exploit is something that takes advantage of that opening to execute an attack.

Code can be “patched” to close the vulnerability opening. Updating a device with the patch code will make it secure against exploits from that specific vulnerability, just like vaccines only protect against specific diseases. Only computers that are updated with the patch code will be secure from the exploits against that vulnerability.

Vulnerability Patching

The MS08-067 became an opening for one of the worst computer worms in history, the Conficker Worm! Also known as Downup, Downadup, and Kido, Conficker is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet and has been unusually difficult to counter because of its combined use of many advanced malware techniques. The Conficker worm infected millions of computers including government, business, and home computers in over 190 countries.

Install important software updates when prompted to be proactive at protecting yourself from vulnerabilities.

Famous Vulnerabilities Matching Activity

Self-Assessment Quiz

Reflection and Wrap-up

In this lesson you have learned that vulnerability testing is one of the most important tasks cybersecurity professionals perform 24/7, to protect individuals, organizations, and governments. You have also learned how to use the NIST National Vulnerability Database (NVD) to research current vulnerabilities and the importance of “patching” those vulnerabilities by taking care of important updates. As we have learned in a previous module, The Human Factor of Cybersecurity, humans are often the weakest link in cybersecurity protection. Don’t be “that” human!

Are YOU proactive at protecting yourself from vulnerabilities? Do you install important software updates when prompted? If you ignore the updates, you may be inviting cyber criminals into your life!

DSBP_UpdateSoftware

 

IntroCybersecurity_LessonBottomBanner

[CC BY-NC-SA 4.0 Links to an external site.] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION - INTENDED ONLY FOR USE WITHIN LESSON.