Need cloud computing? Get started now

CVEs: What They Are, and Ways to Mitigate Their Impact

Jacob Abrams headshot

Written by

Jacob Abrams

May 16, 2023

Jacob Abrams headshot

Written by

Jacob Abrams

Jacob Abrams is a Product Marketing Manager at Akamai working with the Zero Trust security products, specifically Akamai Guardicore Segmentation. Prior to Akamai, he worked with Israeli tech startups to generate sales pipeline and facilitate marketing content creation and promotion. He is based in Somerville, MA.

CVE, or Common Vulnerabilities and Exposures, is a system of referencing publicly known information-security vulnerabilities and exposures.

For those who are newer to the world of IT security (like me!), it’s sometimes overwhelming to get a handle on all of the different terms and abbreviations that practitioners use as shorthand in their work and in their communications. And when it comes to vulnerability management — arguably a central pillar of IT security — there are many similar-sounding words and phrases that are sometimes used interchangeably.

Based on my discussions with the experts, I hope to shed some light on the finer differences among the nomenclature used in vulnerability management, present some ways to start thinking about how to mitigate the impact of vulnerabilities, review the current tools we have available to us, and introduce Akamai’s unique solution for detecting and remediating the impact of vulnerabilities.

What is a vulnerability?

In our industry, there are many definitions of “vulnerability,” and we usually think of it in the context of physical machines or networks. But the National Information Assurance Training and Education Center defines a vulnerability as:

A weakness in automated system security procedures, administrative controls, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.

It’s important to remember that a vulnerability can affect not only software and hardware, but also the procedures and controls you have set in place, which can have very real effects on your ability to respond adequately.

What’s the difference between a weakness and a vulnerability?

Weaknesses can lead to vulnerabilities, but if there is no way to exploit a weakness, it's just that — a weakness. A vulnerability, however, is a weakness that can be actively exploited. And an “exploit” is, of course, the technical manner in which a vulnerability is abused. 

All vulnerabilities rely on weaknesses, but not all weaknesses become vulnerabilities — and not all vulnerabilities get exploited. But, sometimes, there are multiple ways to exploit a vulnerability, even after a patch is issued.

What is CVE?

CVE, or Common Vulnerabilities and Exposures, is a system of referencing publicly known information-security vulnerabilities and exposures. It's both a standardized designation and dictionary, providing a universally accepted way of naming and organizing known vulnerabilities. 

The United States' National Cybersecurity Federally Funded Research and Development Center, operated by The MITRE Corporation, maintains the system, with funding from the National Cyber Security Division of the U.S. Department of Homeland Security. The system was officially launched for the public in September 1999.

The general nomenclature goes like this: The prefix CVE-the year published-some arbitrary digits (the arbitrary digits serve as a unique identifier);

For example, in 2021, it was discovered that the SolarWinds Serv-U FTP product contained a privilege escalation vulnerability, so the CVE for this vulnerability is CVE-2021-25276.

How are vulnerabilities reported?

There is no law or requirement to disclose a vulnerability when found, so if a malicious actor finds a vulnerability in a system, it can be exploited indefinitely until it’s detected, reported, and (hopefully) remediated.

OWASP provides a handy cheat sheet for guidance on the commonly accepted vulnerability disclosure process. Most important, make sure you have:

  • a way (process/system) to internally report vulnerabilities (along with a triage/assign/fix process)
  • a way (process/system) to report vulnerabilities to external audiences (along with a triage/assign/fix process)

How is severity determined?

The most common way to determine the severity of a vulnerability is by using the Common Vulnerability Scoring System (CVSS), which is a free and open standard. The CVSS uses a combination of Exploitability metrics, Scope, and Impact metrics to calculate a base score from 0.0 to 10.0.

  • Exploitability metrics refer to aspects of the vulnerable component itself, and include things such as the Attack Vector (AV), Attack Complexity (AC), whether there were Privileges Required (PR), and the level of User Interaction (UI) required.Think of them as factors that help estimate how easy a vulnerability is to exploit.

  • Scope (in this case, the security scope) refers to the potential of a vulnerability to affect components being managed by other security authorities outside of its own. Whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside its own security scope, a scope change occurs. Typically, a vulnerability that has a scope change increases the overall severity and risk.

  • Impact metrics refer to the effects of a successfully exploited vulnerability on the specific component that suffers the worst direct outcome. These metrics are based on the CIA triad framework. It’s worth noting that for vulnerabilities with a scope change, the Impact metrics should reflect either the vulnerable component, or the impacted component(s), whichever suffers the most severe outcome. Since the initial vulnerable component can end up impacting other components, the entire application, system, or even platform, the Impact metrics need to be adjusted according to the severity of the worst direct outcome.

All these metrics are factored into calculating a score, which is then used to determine a severity (Table 1).

Score
 Severity
9.0–10.0   Critical
7.0–8.9  High
4.0–6.9 Medium
0.1–3.9 Low
0.0 None

Table 1. CVSS scores and their corresponding severities

What about zero-days?

A zero-day vulnerability — the proverbial monster under the bed — is a vulnerability that has been publicly disclosed, but the affected system had no time to patch it before disclosure, or a patch is just not yet available.

High or critical zero-day vulnerabilities are those that are easily exploitable, usually have a changed scope, definitely have a wide impact, and ultimately can have devastating effects — made all the worse by the unavailability of a patch to fix the issue. The famous Log4Shell vulnerability in Apache Log4j is a great example of a critical zero-day, as it was relatively easy to exploit, entailed a significant change in security scope, had a potentially devastating impact, and there wasn’t a patch immediately available.

Although there is no way to protect against every critical vulnerability, including zero-days, those like Log4Shell highlight how critical it is to have multiple layers of defense built into your systems to protect your users, your applications, and your network. This usually starts with having clear and comprehensive visibility into your IT infrastructure, the workloads running on it, your public-facing and internal applications, and the users trying to access those applications. It’s good practice to assume that a breach will happen (when, not if) and make a plan to limit the blast radius of that breach.

Taking action

So, how can we go about remediating CVEs, including those that don’t have a patch yet? The four stages of the Cyber Exposure lifecycle detailed in this comprehensive blog post by Tenable outline the recommended steps for vulnerability management; that is, the steps you can take to ensure that you have the security posture and processes required to quickly and effectively mitigate vulnerabilities as they come up. 

The Cyber Exposure lifecycle

The four stages of the Cyber Exposure lifecycle are:

  1.  Discover (asset discovery and classification)
  2.  Assess (comprehensive and continuous vulnerability assessment)
  3.  Analyze (vulnerability analysis and prioritization)
  4.  Fix (vulnerability remediation and verification)

Let’s examine each one step by step.

Discover

“Visibility” might be the most abundant promise made at marquee cybersecurity conferences, and with good reason — the importance of having and maintaining a complete and up-to-date asset inventory is still fundamentally important to vulnerability management, as well as any cybersecurity or compliance project. 

But it can be hard to reconcile the visibility you have into your devices, clouds, platforms, and systems in one solution with the visibility that’s required into all the layers of your software stack (e.g., containers) provided by another solution. Maintaining both vertical and horizontal visibility into your whole environment can be incredibly difficult for security practitioners, especially when trying to visualize that data in a meaningful way. 

Assess

Once you have your complete, updated asset inventory, you need to start looking for any vulnerabilities on the assets. The deeper your assessment goes, the more data you’ll get, but you’ll also put more strain on the assets themselves.

Analyze

Analyzing every vulnerability can put strain on your systems, as well, and the data produced can be almost unmanageable. By focusing on the vulnerabilities and assets most likely to be exploited and by prioritizing them based on business impact and risk, you can more efficiently begin to remediate them.

Fix

Remediating vulnerabilities can be even trickier than discovering, assessing, and analyzing them. Knowing which patches to apply (assuming patches are available) and dealing with system downtime while applying them are both headwinds that you will face and they need to be planned for accordingly. And when there isn’t an available patch? What then?

Tools available to remediate CVEs

Working through these four steps to remediate a CVE inevitably requires juggling multiple security tools. But are there some synergies between the available tools that could give you a bigger picture and more control, without becoming too cumbersome to manage? Let’s look at what’s available to facilitate each of the framework’s steps.

Configuration management database (CMDB)

A fundamental component of every organization's IT stack is the CMDB, which is the central repository of information about your organization’s assets — software, hardware, systems, products, and even people — and the relationships among all of those assets. 

CMDBs are, by nature, excellent at asset management and configuration tracking, but they don’t provide much visibility into the network, or into connections being made with other assets that may appear unaffected at the surface. Many security solutions feature integrations with CMDBs to leverage the data for network and asset visibility and security purposes.

Cloud security tools

The most common cloud security tools we’re seeing today include:

  • Cloud access security broker (CASB). This cloud security tool has become very well-established in recent years and enforces security policy between the user and the data in the cloud. This tool does everything from authenticating user sessions to single sign-on, device profiling, malware detection/prevention, and unauthorized data transfer and anomalous communications prevention. This may be a good option for cloud environments, but like all cloud-native tools, it won’t do much to protect your on-premises systems or any underlying infrastructure.

  • Cloud security posture management (CSPM). Although this is a strong tool for general cloud asset discovery, normal activity baselining, as well as CVE ingestion and remediation via integration with tools like Tenable, it does not monitor cloud network traffic directly, so you’ll only get alerted after the vulnerability has likely been abused. And since CSPM is dependent on the cloud providers for the network logs required, analysis is rarely performed in near-real time. 

  • Cloud workload protection platform (CWPP). These cloud security tools can cover those parts of the workload that may be on-premises as well as in the cloud, but they have their limits. They don’t cover security issues at the Layer 7 application level, nor do they do much to protect the underlying cloud infrastructure. So, if the vulnerability relies on individual processes to be exploited, or if it affects the underlying cloud infrastructure (which is managed by the cloud providers, not you), your CWPP will not be able to prevent the vulnerability from being exploited and affecting your systems.

  • Cloud-native application protection platform (CNAPP). CNAPPs are a relatively new tool, combining the capabilities of CSPMs and CWPPs. They can also help identify misconfigurations and vulnerabilities in your public cloud deployments, but (again) find themselves limited to just those instances.

Identity and access management (IAM)

A strong choice to assess and potentially block user access in real-time based on risk scores, and it can provide real-time fixes for CVEs on assets or users attempting a connection. But, asset discovery is not a focus of IAM solutions, and it’s not a focus for these solutions to prioritize high volumes of alerts or CVE tags, making management more time consuming and limiting your overall time-to-remediation.

Internet of Things (IoT) security solutions

IoT security is becoming increasingly relevant, and we’re seeing solutions emerge that cater to the unique security challenges posed by these “smart” devices. But these solutions tend to be focused on device discovery, and their remediation capabilities are relatively limited.

Security information and event management (SIEM)

Pronounced “sim,” this tool combines security information management (SIM) and security event management (SEM) into one system. A SIEM tool collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action like limiting access attempts and generating relevant reports. It won’t do much to remediate the actual vulnerability, however, so you’ll need another solution in addition to your SIEM.

Network access control (NAC)

This tool is great at identifying new assets connecting to your network and assessing their security posture, but they’re not really helpful for identifying and mapping existing connections, and they don’t provide much in the way of remediation.

Solution comparison matrix

You can see how each of these tools satisfies each step of the Cyber Exposure lifecycle for vulnerability management in Table 2.

 

Discover

Assess 

Analyze 

Fix

Overall

CMDB

By design, CDMBs are excellent at asset management and configuration tracking

Well-automated systems can match assets with their applicable vulnerabilities

CMDBs give visibility into all assets in the environment, but won’t analyze what could be affected by the connections being made with compromised assets

No built-in remediation capabilities

Strong choice to identify assets that need remediation


Does not inform user about the network- or connection-related implications of the vulnerabilities

Cloud security tools

CSPMs are especially great at this, but discovery is limited to cloud-based assets

CASBs, CSPMs, CWPPs, and CNAPPs all have assessment capabilities for cloud-based assets

CASBs can detect malware and anomalous communications, and CSPMs feature integrations for CVE ingestion

Automated remediation is a primary benefit of CSPMs

Good for asset discovery and automated remediation, but require multiple tools and scope is limited to cloud workloads

IAM

Not a focus

Strong choice to assess and potentially block user access in real time based on risk scores

Not a focus for these solutions to prioritize high volumes of alerts or CVE tags

Good real-time fixes for CVEs on assets or users attempting a connection

Focused on preventative measures, but lacks the breadth to be a holistic solution for assessment or remediation

IoT security solutions

Strong for IoT device discovery, but limited in nature to these types of devices 

Good when automated scanning is available and enabled 

Good insight into IoT device inventories allows for quick analysis and investigation

Not focused on remediation, but some solutions offer steps to approach IoT CVE remediation

Good for its intended use, but remediation capabilities vary and are typically limited

SIEM

Good for aggregating and correlating security incidents, but not designed to manage asset inventories


Only as good as the complementary solutions that are feeding data into it 

Reliance on complementary solutions for asset and activity information

SIEMs can correlate data to identify and prioritize high-risk CVEs

Not a focus for native capability

Good for stages 1–3 but not as focused on remediation like most security orchestration, automation, and response (SOAR) platforms

NAC

Identifies new assets being connected to the network, but not of great use to map and discover existing ones

Assesses the security posture of new assets connecting to the network

Some solutions aid in CVE prioritization for more informed vulnerability assessments 

Not focused on remediation

Good for helping establish the security posture of a newly connected asset, but not great for remediation

Table 2. How each of the available tools satisfies each step of the Cyber Exposure lifecycle 

Table 2 represents how popular security solutions ingest CVE data from solutions like Tenable to improve your overall security posture in various ways. They each present a good case for being included in your security stack for their particular intended use, specific coverage areas, or proven value-adds.

The unique value of Akamai Guardicore Segmentation

But where Akamai adds its own unique value across the CVE discovery and remediation process is the ability to quickly discover and isolate assets for remediation wherever they are on the network.

Akamai Guardicore Segmentation allows you to see the network traffic that is, or has been going, to and from a given asset, allowing you to further isolate a wider group of assets and significantly reduce the blast radius from an attack that may have leveraged an open CVE. Plus, our Insight feature based on osquery enables you to identify assets in your environment according to specific characteristics that you can determine.

Akamai Guardicore Segmentation provides asset discovery, network visibility, and asset isolation across different infrastructures, and integrations with CMDBs allow the solution to provide full contextual visibility into all assets that are communicating in your network. 

And with our tenable.io and tenable.sc integrations, you can query for affected assets in your environment, label them with the CVE (whether they’re in the cloud or on-premises), and quickly enforce granular policy based on the CVE label to swiftly limit communications with the affected assets until a patch or fix is made available. Whether you are looking for open CVEs in your on-premises data center, cloud-hosted workload, container, or unmanaged IoT device, we’ve got you covered.

Akamai Guardicore Segmentation comparison matrix

Table 3 shows how our solution satisfies each step of the Cyber Exposure lifecycle

 

Discover

Assess

Analyze

Fix

Overall

Akamai

Guardicore

Segmentation

Identifies all assets communicating in your network and their dependencies, regardless of infrastructure, OS, or physical location

Continuous monitoring and assessment of your assets and their communications in the network, real-time and historical, enabling you to baseline normal activity and set alerts for abnormal activity

Integration with Tenable allows for the creation and rapid application of labels containing the relevant CVE


AI-powered labeling and built-in osquery functionality give you a view of all affected assets

Policy creation happens quickly because of CVE labels, allowing you to secure your most vulnerable assets

A holistic vulnerability management solution with powerful discovery, assessment, analysis, and remediation capabilities across all infrastructures and environments

Table 3. How Akamai Guardicore Segmentation satisfies each step of the Cyber Exposure lifecycle

Learn more

For more information on how Akamai + Tenable = powerful vulnerability remediation, check out our solution brief or contact us directly.

Special thanks to Szymon Jakubowski and Marco Raffaelli for their contributions to this post.



Jacob Abrams headshot

Written by

Jacob Abrams

May 16, 2023

Jacob Abrams headshot

Written by

Jacob Abrams

Jacob Abrams is a Product Marketing Manager at Akamai working with the Zero Trust security products, specifically Akamai Guardicore Segmentation. Prior to Akamai, he worked with Israeli tech startups to generate sales pipeline and facilitate marketing content creation and promotion. He is based in Somerville, MA.