1.6: Vulnerabilities Flashcards
Zero Day
vulnerability has not been detected or published.
CVE: http://cve.mitre.org
Weak Encryption
Weak encryption protocols can be a source of vulnerability.
Some cipher suites are easier to break than others
Keys less than 128 bit sizes, outdated hashes (md5)
Insecure Protocols
‘In the clear’ protocols that don’t encrypt data.
FTP, SMTP, IMAP
Encrypted versions should be used: SSH, SFTP, IMAPs
Default Settings
every app/device has a default ‘login’
Marai botnet takes advantage of default configs consisting of IoT.
Open Ports and Services
Services open ports, unnecessary open ports are security vulnerabilities.
Improper Patch management
Centrally managed, update server/endpoint manager usually determine which patches to send.
Not being patched can leave backdoors open.
Legacy Platforms
Some devices remain installed for too long
outdates software/middleware and now become a security concern.
3rd Party Risks
Plan for worst possible scenario.
There should be more security, not less.
System Integration Risk
Professional installation and maintenance, can include elevated OS access.
Can be on-site with access to physical devices.
Can run software on the internal network.
Supply Chain Risk
Cant control security from a 3rd parth location.
Hardware/software from vendor can be counterfit/contain malware.