Skip to content

Vulnerability Management - Resources

Vulnerability Lifecycle

Zero days

Market and Researchers

  • Zerodium ("WE PAY BIG BOUNTIES"). From their FAQ: "Zerodium customers are government institutions (mainly from Europe and North America) in need of advanced zero-day exploits and cybersecurity capabilities". Think a little about what this really means.
  • Crowdfense "Crowdfense customers are government institutions in need of advanced zero-day exploits and cyber security capabilities."
  • Zero Day Initiative (ZDI) buys software vulnerabilities from independent security researchers, and then discloses these vulnerabilities to their original vendors for patching before making such information public.
  • Pwn2Own a computer hacking contest aimed at exploiting widely used software and mobile devices with previously unknown vulnerabilities. Winners receive a cash prize (supported by ZDI).
  • Project Zero is a team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.

Data

Outbreaks (exploitation immediately after disclosure)

  • The Numbers Behind Log4j Vulnerability CVE-2021-44228 Twenty-four hours after the initial outbreak our sensors recorded almost 200,000 attempts of attack across the globe.
  • Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign An adversary appears to have exploited CVE-2023-3519 in an automated fashion, placing webshells on vulnerable NetScalers to gain persistent access. The adversary can execute arbitrary commands with this webshell, even when a NetScaler is patched and/or rebooted. At the time of this exploitation campaign, 31127 NetScalers were vulnerable. One month after, 1828 NetScalers remain backdoored even though 1248 of them are patched.
  • CVE-2023-20198 – Cisco IOS-XE ZeroDay (Censys) On October 16, Cisco released an advisory regarding a critical zero day privilege escalation vulnerability in their IOS XE Web UI software. On October 18th, we have seen an increase in the number of infections from 34,140 to 41,983 hosts.

EPSS

Exploitation Prediction

Asset management

Software Dependencies

  • Software Bill of Materials (SBOM) A “software bill of materials” (SBOM) has emerged as a key building block in software security and software supply chain risk management. A SBOM is a nested inventory, a list of ingredients that make up software components.