CH14 Vulnerability Disclosure Flashcards

1
Q

At what stage of the SSDLC does the Vulnerability Disclosure come

A

The Security Response Stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A vulnerability researcher can report a vulnerability into what 4 possible mediums?

A

Responsible Disclosure to a vendor
Full disclosure for the internet
National Security Market to Nation States
Black Market for Criminals

Criminals and Nation States will feed this back as a System Exploit to the System Owner

Vendors can make patches that can be added to a Full disclosure publication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Full Disclosure

A

Publishing vulnerabilities immediatley to the public without restriction

Creates pressures on vendors (big economic incentive)
Forces vendors to patch quickly (and customers to install/implement patches quickly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsible Disclosure

A

Publishing vulnerabilities after a mitigation period to the public

“invented” around 2004

Creates pressures on vendors to react within mitigation-period typical mitigation period: 90 days (can be case by case, with vendor)

Allows vendors to distribute patches to their customers “in private”

If they fail to react, vulnerability is published without restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Selling Vulnerabilities

A

Zerodium buys exploits and sells them to government clients

Sells prices depending on exploit

Sells for
RCE: Remote Code Execution
LPE: Local Privilege Escalation
SBX: Sandbox Escape or Bypass
VME: Virtual Machine Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bug Bounty Programs

A

“Guide” security researcher by rewarding them for finding (certain types of) vulnerabilities in products

The idea is to create a win-win situation:
- security are encouraged to look at specific products (increases security of that product and supports vendor internal activities)
- Security researchers get a reward for their work
- can be organized by a vendor or outsourced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you found a vulnerability

A

be careful - always consult a lawyer (or very experienced party)
check if the vendor has published guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 stages within security response

A

Report: A security reseacher submits a vulnerability report

Validate: Analyst validates the report

Triage: the analyst triages the report

Remediate: Engineering develops a remediation plan

Disclose: the vendor discloses the vulnerability to the public (or customers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What in essence is the security response

A

the acitvity of responding to vulnerability reported in your organisation’s product or service

part of the large ecosystem of product secuirty; integrating security processes into the software development lifecycle

not “vulnerability management”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why 90 days for a vulnerability triage from a vendor can be short

A

finding the responsible for triaging a vulnerability can take a few days

clarifying details with the security researcher can take weeks

developing a fix often only takes hours after the problem is understood

testing that a security fix does not introduce unwanted changes and can take months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly