SlideShare una empresa de Scribd logo
1 de 21
© iViZ Security Inc
1May 2013
Bikash Barai, Co-Founder & CEO
Why Current Security Solutions Fail?
© iViZ Security Inc
2May 2013
Introduction
• About iViZ
– Cloud based Application Penetration Testing
– Zero False Positive Guarantee
– Business Logic Testing with 100% WASC coverage
– 400+ customers. IDG Ventures Funded.
– Gartner Hype Cycle mention
• About myself
– Co-founder and CEO of iViZ
– Worked in areas of AI, Anti-spam filters, Multi stage attack
simulation etc
– Love AI, Security, Entrepreneurship, Magic /Mind Reading
© iViZ Security Inc
3May 2013
Vulnerabilities in Security Products
© iViZ Security Inc
4May 2013
Symantec Email Appliance(9.5.x)
Description Rating
Out-of-band stored-XSS - delivered by email Critical
XSS (both reflective and stored) with session-hijacking High
Easy CSRF to add a backdoor-administrator (for example) High
SSH with backdoor user account + privilege escalation to root High
Ability for an authenticated attacker to modify the Web-
application
High
Arbitrary file download was possible with a crafted URL Medium
Unauthenticated detailed version disclosure Low
Credits: Brian Smith
© iViZ Security Inc
5May 2013
Trend Email Appliance(8.2.0.X)
Description Rating
Out-of-band stored-XSS in user-portal - delivered via email Critical
XSS (both reflective and stored) with session-hijacking High
Easy CSRF to add a backdoor-administrator (for example) High
Root shell via patch-upload feature (authenticated) High
Blind LDAP-injection in user-portal login-screen High
Directory traversal (authenticated) Medium
Unauthenticated access to AdminUI logs Low
Unauthenticated version disclosure Low
Credits: Brian Smith
© iViZ Security Inc
6May 2013
Microsoft Auto-update Hijacking
• MD5 collision attack to generate a counterfeit
copy of a Microsoft Terminal Server Licensing
Service certificate.
• Used the counterfeit certificate to sign code
such that malware appeared like genuine
Microsoft code and hence remained
undetected.
© iViZ Security Inc
7May 2013
Preboot Authentication Attacks
• iViZ identified flaws in numerous BIOS’s and pre-
boot authentication and disk encryption software
– Bitlocker, TrueCrypt, Mcaffee Safeboot, DriveCryptor,
Diskcryptor, LILO, GRUB, HP Bios, Intel/Lenevo BIOS
found to be vulnerable.
• Flaws resulted in disclosure of plaintext pre-boot
authentication passwords.
• In some cases, an attacked could bypass pre-boot
authentication.
© iViZ Security Inc
8May 2013
Vulnerabilities in Anti-Virus
• Discovered by iViZ Security
• Antivirus products process different types of
files having different file-formats.
• We found flaws in handling malformed
compressed, packed and binary files in AVG,
Sophos, Avast etc
• Some of the file formats for which we found
flaws in AV products are
– ISO, RPM, ELF, PE, UPX, LZH
© iViZ Security Inc
9May 2013
More Vulnerabilities in AV products
• Detection Bypass
– CVE-2012-1461: The Gzip file parser in AVG Anti-
Virus, Bitdefender, F-Secure , Fortinet antiviruses,
allows remote attackers to bypass malware
detection via a .tar.gz file
• Denial of Service (DoS)
– CVE-2012-4014: Unspecified vulnerability in
McAfee Email Anti-virus (formerly WebShield
SMTP) allows remote attackers to cause a denial
of service via unknown vectors.
© iViZ Security Inc
10May 2013
Vulnerabilities in VPN products
• Remote Code Execution
– CVE-2012-2493: Cisco AnyConnect Secure
Mobility Client 2.x does not properly validate
binaries that are received by the downloader
process, which allows remote attackers to execute
arbitrary code.
– CVE-2012-0646: Format string vulnerability in
VPN in Apple iOS before 5.1 allows remote
attackers to execute arbitrary code via a crafted
racoon configuration file.
© iViZ Security Inc
11May 2013
Report Findings
© iViZ Security Inc
12May 2013
About the Report/Study
• iViZ used databases such as the Common
Vulnerability Enumeration (CVE), Common
Product Enumeration (CPE) and National
Vulnerability Database (NVD) for the Analysis
© iViZ Security Inc
13May 2013
Key Findings
• Vulnerabilities increasing at CAGR of 37.29% over the last 3 Years.
• Anti-Virus accounts for 49% of the vulnerabilities, next Firewall (24%)
• Top 3 Security vendors with maximum vulnerabilities: McAfee, Cisco
followed by Symantec.
• Top 3 Security products with maximum vulnerabilities: Rising-Global’s
Antivirus , Cisco’s Adaptive Security Appliance and Ikarus Virus Utilities.
• Access Control is the most prominent weakness in Security Products
followed by Input Validation.
• SQL Injection is the least found vulnerability among Security products
© iViZ Security Inc
14May 2013
Vulnerability Trends
In All Products In Security Products
© iViZ Security Inc
15May 2013
Vulnerability by Product Types in 2012
© iViZ Security Inc
16May 2013
Vulnerabilities by Vendors
© iViZ Security Inc
17May 2013
© iViZ Security Inc
18May 2013
Comparative Analysis
© iViZ Security Inc
19May 2013
5 Predictions..
• We predict an increase in attacks on security
products, companies or solutions
• APT and Cyber-warfare makes “Security
Products” as the next choice
• Majority of vulnerabilities discovered will not
become public and shall remain in the hands of
APT actors
• Security Products are “High Pay-off” targets since
they are present in most systems
• More vulnerabilities would be sold in Zero Day –
Black Market
© iViZ Security Inc
20May 2013
What should we do to protect us?
• Test and Don’t Trust (blindly): Conduct proper
due diligence of the security product
• Ask for audit reports
• Patch security products like any other product
• Treat security tools in similar manner as other
tools during threat modeling
• Have proper detection and monitoring
solutions and multi-layer defense
© iViZ Security Inc
21May 2013
Thank You
bikash@ivizsecurity.com
Blog: http://blog.ivizsecurity.com/
Linkedin:
http://www.linkedin.com/pub/bikash-barai/0/7a4/669
Twitter: https://twitter.com/bikashbarai1
DISCLAIMER
We have used well known vulnerability standards and database like Common Vulnerability Enumeration (CVE), Common Product Enumeration
(CPE) and Nation Vulnerability Database (NVD). One of the major challenges we faced was in classifying the products into security and non-
security products, as the current product standard (CPE) does not support it. We solved this challenge by considering that security products have
certain keywords like, ‘ ID‘virus’, ‘firewall‘, ‘IPS‘, ‘scan’ etc. Hence there are chances of some date being missed and the report should be
considered as indicative. iViZ disclaims all warranties, expressed or implied, with respect to this research for any particular purpose.

Más contenido relacionado

La actualidad más candente

Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell ApartIBM Security
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure productMichael Furman
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Sophos Benelux
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
I Vi Z Profile
I Vi Z ProfileI Vi Z Profile
I Vi Z Profilekhushboo
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocolKirti Ahirrao
 

La actualidad más candente (19)

Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell Apart
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
 
iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
I Vi Z Profile
I Vi Z ProfileI Vi Z Profile
I Vi Z Profile
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
Secure Coding 2013
Secure Coding 2013 Secure Coding 2013
Secure Coding 2013
 

Destacado

New realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsNew realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsDaveEdwards12
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013DaveEdwards12
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5DaveEdwards12
 
New realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsNew realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsDaveEdwards12
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security ProductsDaveEdwards12
 
A Journey to Protect Points of Sale (POS)
A Journey to Protect Points of Sale (POS)A Journey to Protect Points of Sale (POS)
A Journey to Protect Points of Sale (POS)DaveEdwards12
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDaveEdwards12
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsDaveEdwards12
 
22 Forex Trading Mistakes Costing you Money
22 Forex Trading Mistakes Costing you Money22 Forex Trading Mistakes Costing you Money
22 Forex Trading Mistakes Costing you MoneyxUWx
 
Using 80 20 rule in application security management
Using 80 20 rule in application security managementUsing 80 20 rule in application security management
Using 80 20 rule in application security managementDaveEdwards12
 
Anatomy of business logic vulnerabilities
Anatomy of business logic vulnerabilitiesAnatomy of business logic vulnerabilities
Anatomy of business logic vulnerabilitiesDaveEdwards12
 

Destacado (12)

New realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsNew realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systems
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5
 
New realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systemsNew realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systems
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 
A Journey to Protect Points of Sale (POS)
A Journey to Protect Points of Sale (POS)A Journey to Protect Points of Sale (POS)
A Journey to Protect Points of Sale (POS)
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
22 Forex Trading Mistakes Costing you Money
22 Forex Trading Mistakes Costing you Money22 Forex Trading Mistakes Costing you Money
22 Forex Trading Mistakes Costing you Money
 
Using 80 20 rule in application security management
Using 80 20 rule in application security managementUsing 80 20 rule in application security management
Using 80 20 rule in application security management
 
Anatomy of business logic vulnerabilities
Anatomy of business logic vulnerabilitiesAnatomy of business logic vulnerabilities
Anatomy of business logic vulnerabilities
 

Similar a Why current security solutions fail

iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Techno Solutions
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLiphonepentest
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 

Similar a Why current security solutions fail (20)

iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Introduction to Application Security Testing
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security Testing
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 

Why current security solutions fail

  • 1. © iViZ Security Inc 1May 2013 Bikash Barai, Co-Founder & CEO Why Current Security Solutions Fail?
  • 2. © iViZ Security Inc 2May 2013 Introduction • About iViZ – Cloud based Application Penetration Testing – Zero False Positive Guarantee – Business Logic Testing with 100% WASC coverage – 400+ customers. IDG Ventures Funded. – Gartner Hype Cycle mention • About myself – Co-founder and CEO of iViZ – Worked in areas of AI, Anti-spam filters, Multi stage attack simulation etc – Love AI, Security, Entrepreneurship, Magic /Mind Reading
  • 3. © iViZ Security Inc 3May 2013 Vulnerabilities in Security Products
  • 4. © iViZ Security Inc 4May 2013 Symantec Email Appliance(9.5.x) Description Rating Out-of-band stored-XSS - delivered by email Critical XSS (both reflective and stored) with session-hijacking High Easy CSRF to add a backdoor-administrator (for example) High SSH with backdoor user account + privilege escalation to root High Ability for an authenticated attacker to modify the Web- application High Arbitrary file download was possible with a crafted URL Medium Unauthenticated detailed version disclosure Low Credits: Brian Smith
  • 5. © iViZ Security Inc 5May 2013 Trend Email Appliance(8.2.0.X) Description Rating Out-of-band stored-XSS in user-portal - delivered via email Critical XSS (both reflective and stored) with session-hijacking High Easy CSRF to add a backdoor-administrator (for example) High Root shell via patch-upload feature (authenticated) High Blind LDAP-injection in user-portal login-screen High Directory traversal (authenticated) Medium Unauthenticated access to AdminUI logs Low Unauthenticated version disclosure Low Credits: Brian Smith
  • 6. © iViZ Security Inc 6May 2013 Microsoft Auto-update Hijacking • MD5 collision attack to generate a counterfeit copy of a Microsoft Terminal Server Licensing Service certificate. • Used the counterfeit certificate to sign code such that malware appeared like genuine Microsoft code and hence remained undetected.
  • 7. © iViZ Security Inc 7May 2013 Preboot Authentication Attacks • iViZ identified flaws in numerous BIOS’s and pre- boot authentication and disk encryption software – Bitlocker, TrueCrypt, Mcaffee Safeboot, DriveCryptor, Diskcryptor, LILO, GRUB, HP Bios, Intel/Lenevo BIOS found to be vulnerable. • Flaws resulted in disclosure of plaintext pre-boot authentication passwords. • In some cases, an attacked could bypass pre-boot authentication.
  • 8. © iViZ Security Inc 8May 2013 Vulnerabilities in Anti-Virus • Discovered by iViZ Security • Antivirus products process different types of files having different file-formats. • We found flaws in handling malformed compressed, packed and binary files in AVG, Sophos, Avast etc • Some of the file formats for which we found flaws in AV products are – ISO, RPM, ELF, PE, UPX, LZH
  • 9. © iViZ Security Inc 9May 2013 More Vulnerabilities in AV products • Detection Bypass – CVE-2012-1461: The Gzip file parser in AVG Anti- Virus, Bitdefender, F-Secure , Fortinet antiviruses, allows remote attackers to bypass malware detection via a .tar.gz file • Denial of Service (DoS) – CVE-2012-4014: Unspecified vulnerability in McAfee Email Anti-virus (formerly WebShield SMTP) allows remote attackers to cause a denial of service via unknown vectors.
  • 10. © iViZ Security Inc 10May 2013 Vulnerabilities in VPN products • Remote Code Execution – CVE-2012-2493: Cisco AnyConnect Secure Mobility Client 2.x does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code. – CVE-2012-0646: Format string vulnerability in VPN in Apple iOS before 5.1 allows remote attackers to execute arbitrary code via a crafted racoon configuration file.
  • 11. © iViZ Security Inc 11May 2013 Report Findings
  • 12. © iViZ Security Inc 12May 2013 About the Report/Study • iViZ used databases such as the Common Vulnerability Enumeration (CVE), Common Product Enumeration (CPE) and National Vulnerability Database (NVD) for the Analysis
  • 13. © iViZ Security Inc 13May 2013 Key Findings • Vulnerabilities increasing at CAGR of 37.29% over the last 3 Years. • Anti-Virus accounts for 49% of the vulnerabilities, next Firewall (24%) • Top 3 Security vendors with maximum vulnerabilities: McAfee, Cisco followed by Symantec. • Top 3 Security products with maximum vulnerabilities: Rising-Global’s Antivirus , Cisco’s Adaptive Security Appliance and Ikarus Virus Utilities. • Access Control is the most prominent weakness in Security Products followed by Input Validation. • SQL Injection is the least found vulnerability among Security products
  • 14. © iViZ Security Inc 14May 2013 Vulnerability Trends In All Products In Security Products
  • 15. © iViZ Security Inc 15May 2013 Vulnerability by Product Types in 2012
  • 16. © iViZ Security Inc 16May 2013 Vulnerabilities by Vendors
  • 17. © iViZ Security Inc 17May 2013
  • 18. © iViZ Security Inc 18May 2013 Comparative Analysis
  • 19. © iViZ Security Inc 19May 2013 5 Predictions.. • We predict an increase in attacks on security products, companies or solutions • APT and Cyber-warfare makes “Security Products” as the next choice • Majority of vulnerabilities discovered will not become public and shall remain in the hands of APT actors • Security Products are “High Pay-off” targets since they are present in most systems • More vulnerabilities would be sold in Zero Day – Black Market
  • 20. © iViZ Security Inc 20May 2013 What should we do to protect us? • Test and Don’t Trust (blindly): Conduct proper due diligence of the security product • Ask for audit reports • Patch security products like any other product • Treat security tools in similar manner as other tools during threat modeling • Have proper detection and monitoring solutions and multi-layer defense
  • 21. © iViZ Security Inc 21May 2013 Thank You bikash@ivizsecurity.com Blog: http://blog.ivizsecurity.com/ Linkedin: http://www.linkedin.com/pub/bikash-barai/0/7a4/669 Twitter: https://twitter.com/bikashbarai1 DISCLAIMER We have used well known vulnerability standards and database like Common Vulnerability Enumeration (CVE), Common Product Enumeration (CPE) and Nation Vulnerability Database (NVD). One of the major challenges we faced was in classifying the products into security and non- security products, as the current product standard (CPE) does not support it. We solved this challenge by considering that security products have certain keywords like, ‘ ID‘virus’, ‘firewall‘, ‘IPS‘, ‘scan’ etc. Hence there are chances of some date being missed and the report should be considered as indicative. iViZ disclaims all warranties, expressed or implied, with respect to this research for any particular purpose.

Notas del editor

  1. Antivirus software is one of the most complicated applications. It has to deal with hundreds of file types and formats: executables (exe, dll, msi, com, pif, cpl, elf, ocx, sys, scr, etc); documents (doc, xls, ppt, pdf, rtf, chm, hlp, etc); compressed archives (arj, arc, cab, tar, zip, rar, z, zoo, lha, lzh, ace, iso, etc); executable packers (upx, fsg, mew, nspack, wwpack, aspack, etc); media files (jpg, gif, swf, mp3, rm, wmv, avi, wmf, etc), Each of these formats can be quite complex. Hence, it is extremely difficult for antivirus software process all these format appropriately.