{"id":884,"date":"2022-06-29T00:00:00","date_gmt":"2022-06-29T00:00:00","guid":{"rendered":"https:\/\/nl1g1e2381-staging.onrocket.site\/easily-remediate-the-cves-most-likely-to-harm-you-using-forward-enhanced-device-vulnerability-analysis\/"},"modified":"2024-04-01T20:11:22","modified_gmt":"2024-04-01T20:11:22","slug":"easily-remediate-the-cves-most-likely-to-harm-you-using-forward-enhanced-device-vulnerability-analysis","status":"publish","type":"post","link":"https:\/\/www.forwardnetworks.com\/blog\/2022\/06\/29\/easily-remediate-the-cves-most-likely-to-harm-you-using-forward-enhanced-device-vulnerability-analysis\/","title":{"rendered":"Easily remediate the CVEs most likely to harm you using Forward Enhanced Device Vulnerability Analysis"},"content":{"rendered":"\n<p>Headline grabbing vulnerabilities, like SolarWinds and Log4Shell, target management software and end hosts, but if you search for \u201cmost exploited vulnerabilities\u201d on Google, you will quickly learn that some of them directly target network and security devices as well as server load balancers.<\/p>\n\n\n\n<p>These are the 3 most exploited CVEs in the last couple of years:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CVE- 2021-22986&nbsp;(CVSS score: 9.8) - F5 BIG-IP remote code execution vulnerability&nbsp;<\/li>\n\n\n\n<li>CVE-2019-19781&nbsp;(CVSS score: 9.8) - Citrix Application Delivery Controller (ADC) and Gateway directory traversal vulnerability&nbsp;<\/li>\n\n\n\n<li>CVE-2020-12812&nbsp;(CVSS score: 9.8) - Fortinet FortiOS authentication vulnerability in SSL VPN<\/li>\n<\/ul>\n\n\n\n<p><br>Would you be surprised to learn that network device operating systems can be vulnerable to security flaws like any other software? To remediate this risk, network and security administrators need a vulnerability management program in place. Having the right processes and technology in place can save time while protecting the network security posture.<\/p>\n\n\n\n<p>A common approach is to split vulnerability management into two phases:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Build a list of affected devices and related vulnerabilities<\/li>\n\n\n\n<li>Prioritize and address these vulnerabilities<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Build a list of affected devices and related vulnerabilities&nbsp;<\/h2>\n\n\n\n<p>Publicly disclosed security vulnerabilities have an assigned <strong>CVE <\/strong>(Common Vulnerabilities and Exposures) ID number and a severity level based on their impact. CVEs help you to coordinate the efforts to prioritize and address these vulnerabilities to make systems and networks more secure. Most enterprise networks have evolved over time and include devices from several vendors running multiple versions of operating systems. Knowing that a vulnerability was announced doesn\u2019t give a clear picture of the organization's correlative risk.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Large enterprises do their best to keep an accurate inventory of devices and their state, but given that most companies have experienced mergers, IT department turnover, and are resource constrained, this inventory is rarely current. Because networking vendors typically fix security vulnerabilities by issuing a new OS version, a detailed and up-to-date inventory is paramount. Trying to conduct this analysis manually is expensive, time-consuming, and error prone.<\/p>\n\n\n\n<p>To make the analysis easier, faster, and more reliable, Forward provides a network devices vulnerability analysis that automatically compares the CVE information from the <a href=\"https:\/\/nvd.nist.gov\/vuln\/full-listing\">NIST National Vulnerability Database (NVD)<\/a> with OS version running on the devices in your network.<\/p>\n\n\n\n<p>This analysis provides a list of all <strong>possibly affected devices<\/strong> and related vulnerabilities. \u201cWhy <strong>possibly <\/strong>affected?\u201d you might ask. Keep on reading and you will find out why.<\/p>\n\n\n\n<p>The following screenshot shows an example of network vulnerability analysis in the Forward UI.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2023\/10\/Enhanced-Vulnerability-Analysis-blog1.png\" alt=\"\" class=\"wp-image-61371\"\/><figcaption class=\"wp-element-caption\">Fig 1: Forward device vulnerability analysis<br><\/figcaption><\/figure><\/div>\n\n\n<p>The summary at the top shows the number of <strong>CVEs detected<\/strong> as well as the number of <strong>devices impacted<\/strong>.<\/p>\n\n\n\n<p>The table shows a summary view of the CVEs including <strong>CVE ID<\/strong>, <strong>Severity<\/strong>, <strong>Description<\/strong>, <strong>Impacted OS<\/strong>, <strong>Impacted versions<\/strong>, and the number of <strong>Possibly impacted devices<\/strong>.<\/p>\n\n\n\n<p>The <strong>Details <\/strong>page shows you information about devices that are impacted by that CVE like <strong>Device<\/strong>, <strong>Model<\/strong>, <strong>OS version<\/strong>, and <strong>Management IPs<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2023\/10\/Enhanced-Vulnerability-Analysis-blog2.png\" alt=\"\" class=\"wp-image-61372\"\/><figcaption class=\"wp-element-caption\">Fig 2: CVE details page<br><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Prioritize and address vulnerabilities<\/h2>\n\n\n\n<p>One of the fundamental issues is that the number of vulnerabilities and devices affected can be overwhelming, making it difficult to prioritize which devices should be updated first. Filtering vulnerabilities by severity provides some help but typically the number of <strong><em>Critical <\/em><\/strong>and <strong><em>High <\/em><\/strong>severity vulnerabilities is still so high that it\u2018s challenging to determine a starting point. This is where the notion of \u201c<strong><em>possibly affected<\/em><\/strong><strong> devices\u201d becomes pertinent<\/strong>. Some vulnerabilities can impact a device only if specific configurations are present, a specific feature is turned on, or they are deployed in a way that is explained in the CVE. This information is not in the NIST database, network engineers have to research vendor sites such as the <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\">Cisco Security Advisory<\/a> repository to get this level of detail.&nbsp;<\/p>\n\n\n\n<p>There\u2019s a better way<\/p>\n\n\n\n<p>Monitoring the latest descriptions and automatically checking them against the device configurations in your network is best performed by software \u2014 it frees up highly skilled engineers to spend time on proactive strategic initiatives and is far more accurate. For many NOC teams, this capability would be <strong><em>A dream come true<\/em><\/strong>, or<strong><em> Like Christmas came early<\/em><\/strong>, right?<\/p>\n\n\n\n<p>Well, that is exactly what <strong>Forward Enhanced Vulnerability Analysis<\/strong> provides!!<\/p>\n\n\n\n<p>No more manual, tedious, and error-prone hunting for those configs on every single \u201cpossibly affected\u201d device, one by one, that would take forever.<\/p>\n\n\n\n<p>Just an always accurate, always updated list of devices that are actually vulnerable! Remediation efforts can be prioritized based on risk severity to ensure effort is directed to keeping the network as safe as possible.The screenshot below shows the <strong>Detected based on<\/strong> field. This field indicates that there is an at-risk device in the network that matches the OS version only (<strong>OS version match<\/strong>) or is running the impacted OS version and matches the vulnerable configuration (<strong>Config match<\/strong>).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2023\/10\/Enhanced-Vulnerability-Analysis-blog3.png\" alt=\"\" class=\"wp-image-61374\"\/><figcaption class=\"wp-element-caption\">Fig 3: Filtering by detection type<br><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Additional resources<\/h2>\n\n\n\n<p><a href=\"https:\/\/youtu.be\/v7ZRBcILiX0\">Watch this 3 minute video:<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Using Forward&#039;s Vulnerability Analysis with Fabrizio Maccioni\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/v7ZRBcILiX0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2021\/11\/FINAL-MitigatingRiskCVE-1.pdf\">Read the use case to learn more about how Forward Enterprise can help limit your CVE exposure.<\/a> Stay tuned with Forward Networks announcements because some great new innovations about vulnerabilities are...coming soon...<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Headline grabbing vulnerabilities, like SolarWinds and Log4Shell, target management software and end hosts, but if you search for \u201cmost exploited vulnerabilities\u201d on Google, you will quickly learn that some of them directly target network and security devices as well as server load balancers. These are the 3 most exploited CVEs in the last couple of [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[17],"tags":[],"ppma_author":[29],"class_list":["post-884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"aioseo_notices":[],"authors":[{"term_id":29,"user_id":8,"is_guest":0,"slug":"chiararegale","display_name":"Chiara Regale","avatar_url":{"url":"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2023\/10\/Chiara-Regale.webp","url2x":"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2023\/10\/Chiara-Regale.webp"},"author_category":"","user_url":"","last_name":"Regale","first_name":"Chiara","job_title":"","description":"SVP of Product and User Experience at Forward Networks."}],"_links":{"self":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/comments?post=884"}],"version-history":[{"count":4,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/884\/revisions"}],"predecessor-version":[{"id":2440,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/884\/revisions\/2440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/media\/885"}],"wp:attachment":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/media?parent=884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/categories?post=884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/tags?post=884"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/ppma_author?post=884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}