Types of Vulnerabilities - 2.3

Application

  • Memory Injection
  • Buffer Overflow
  • Race Conditions: multiple applications accessing and modifying shared data at the same time.
    • Time-of-Check (TOC)
    • Time-of-use (TOU)
  • Malicious updates

Web Based

  • Structured Query Language Injection (SQLi)
  • Cross-Site-Scripting (XSS)
    • Code injection where malicious scripts are injected into trusted websites OWASP

Hardware

  • Firmware
    • Software that is embedded directly into hardware devices
    • Provides low-level control needed for hardware to function properly, acting as the intermediary between hardware and higher level OS.
  • End-of-Life
    • EOL: A product no longer sold, but may have security updates for x period of time remaining, but the product is nearing its complete end
    • EOSL: A product that is no longer sold or supported. It receives no security updates and software support and is considered vulnerable.
  • Legacy

Virtualization

  • Virtual machine (VM) escape
  • Resource reuse: Issue with hypervisor resource allocation that can result is separate VM having access to other VM resources.

Cloud Specific

Supply Chain

  • Should contain regular audits of providers to look for vulnerabilities
  • Service Providers: external organizations making up part of the supply chain

Misconfigurations (Cryptographic Misconfigurations)

  • Incorrect access settings, sometimes default access settings, that allow access to application / servers where that access should be restricted.
  • Use of insecure protocols (HTTP, SMPT, IMAP, etc) over secure, cryptographic/encrypted, protocols (HTTPS, IMAPS, SSH, etc).
    • Worth noting that the additional 'S' in some of these methods reference that a protocols is "Secure".

Mobile Device

  • Jailbreaking/Rooting: Replacing a phones existing firmware and replacing the OS
  • Side Loading: Installing apps from non-approved company sources
  • Both examples show how employees can bypass security standards set by organizations, getting around MDM (Mobile Device Manager) setups.

Zero-Day Vulnerabilities

  • An unknown vulnerability exploited by an attacker. Since the vulnerability was unknown, no patch or mitigating fix is available.
  • The term zero-day is a more generalized term to describe attacks without a know patch or solution.