{"id":13030,"date":"2019-03-26T16:51:52","date_gmt":"2019-03-26T12:51:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/patching-strategy-rsa2019\/13030\/"},"modified":"2019-11-15T15:22:24","modified_gmt":"2019-11-15T11:22:24","slug":"patching-strategy-rsa2019","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/patching-strategy-rsa2019\/13030\/","title":{"rendered":"RSAC 2019: Seeking the perfect patching strategy"},"content":{"rendered":"<p>\u201cExcuse me, sir, do you have a moment to talk about security updates?\u201d<\/p>\n<p>\u201cNope, too busy installing patches.\u201d<\/p>\n<p>Seriously, though, it\u2019s worth pausing to think about how effectively (or not) you are managing patches.<\/p>\n<p>In a perfect world, you would install all patches for all software in use at your company as soon as they rolled out. But in real life, things are a little more complicated, and there\u2019s never enough time for all patches\u00a0\u2014 so you have to prioritize. But how best to do it?<\/p>\n<p>At the RSA Conference 2019, <a target=\"_blank\" href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/14744-the-etiology-of-vulnerability-exploitation\" rel=\"noopener noreferrer nofollow\">Jay Jacobs of the Cyenta Institute and Michael Roytman of Kenna Security<\/a> presented a study entitled \u201cThe <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Etiology\" rel=\"noopener noreferrer nofollow\">Etiology<\/a> of Vulnerability Exploitation.\u201d The well-argued report addressed what vulnerabilities are worthy of increased attention and how to dramatically improve patch installation and security update strategy.<\/p>\n<p>The basic premise is that not all vulnerabilities are exploited in practice. Assuming that\u2019s true, a great many updates can safely be pushed back, giving priority to vulnerabilities that really can (and most likely will) be used in an attack. But how does one distinguish \u201cdangerous\u201d vulnerabilities from the \u201cmostly harmless\u201d variety?<\/p>\n<p>Armed with descriptions from the CVE (Common Vulnerabilities and Exposures)\u00a0database and publicly available exploit databases, as well as data from vulnerability scanners and IPS\/IDS systems (a total of 7.3 billion attack records and 2.8 billion vulnerabilities in 13 million systems), the researchers built a model that handles the task pretty well. To put that into perspective requires a small bit of analysis of the vulnerability landscape.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n<h2>How many CVEs exist in the wild?<\/h2>\n<p>Any information security expert will tell you that the number of known vulnerabilities is huge. But not many (if any) know the precise figure. At present, about 108,000 CVEs have been published.<\/p>\n<p>Bear in mind also that in the past couple of years, the rate of monthly publications has risen: If during the years 2005\u20132017 about 300\u2013500 CVEs were published every month, at the end of 2017 the average monthly value shot past 1,000 and has stayed that high ever since. Think about it: That\u2019s dozens of new bugs every day!<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165216\/patching-strategy-rsac2019-slide-1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165216\/patching-strategy-rsac2019-slide-1.jpg\" alt=\"CVE publication rate increased dramatically in 2017, exceeding 1,000 per month\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13033\"><\/a><\/p>\n<p>The existence of an exploit generally becomes known either shortly before or immediately after the relevant CVE is published. There are exceptions, but in most cases the window is plus or minus two weeks around the date of CVE publication. So CVEs demand a quick response.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165226\/patching-strategy-rsac2019-slide-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165226\/patching-strategy-rsac2019-slide-2.jpg\" alt=\"In most cases, an exploit appears within a plus-or-minus-two-week window around the CVE publication date\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13035\"><\/a><\/p>\n<p>It goes without saying that update install rates lag somewhat behind. On the average, a month after detection only a quarter of vulnerabilities are patched. It takes 100 days to eliminate half, and a quarter remain unpatched a year later.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165237\/patching-strategy-rsac2019-slide-3.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165237\/patching-strategy-rsac2019-slide-3.jpg\" alt=\"On the average, a quarter of vulnerabilities remain open a year after a fix appears\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13037\"><\/a><\/p>\n<p>More than two-thirds of unpatched vulnerabilities exist in products from just three vendors. No marks for guessing which vendors and which products:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165246\/patching-strategy-rsac2019-slide-4.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165246\/patching-strategy-rsac2019-slide-4.jpg\" alt=\"More than two-thirds of unpatched holes are in Oracle, Microsoft, and Adobe products\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13039\"><\/a><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165256\/patching-strategy-rsac2019-slide-5.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165256\/patching-strategy-rsac2019-slide-5.jpg\" alt=\"Products that most often go unpatched: Java and Acrobat lead the pack\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13041\"><\/a><\/p>\n<p>Meanwhile, 77% of CVEs have no published exploit. Also of interest is that not all published vulnerabilities are encountered in real world environments\u00a0\u2014 only 37,000 of the 108,000 CVEs in existence. And only 5,000 CVEs simultaneously exist in the wild and are exploitable. It is these vulnerabilities that should em&gt; be prioritized\u00a0\u2014 they just need to be correctly identified.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165308\/patching-strategy-rsac2019-slide-6.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165308\/patching-strategy-rsac2019-slide-6.jpg\" alt=\"Of the 108,000 CVEs known to exist, only 5,000 are encountered in real environments and exploited in attacks\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13043\"><\/a><\/p>\n<h2>Existing patching strategies<\/h2>\n<p>The researchers measured the relevance of the patching strategies against two metrics: The share of \u201cdangerous\u201d vulnerabilities in the total number of patched ones (efficiency), and conversely, the share of patched vulnerabilities in the total number of \u201cdangerous\u201d ones (coverage).<\/p>\n<div id=\"attachment_26181\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165319\/patching-strategy-rsac2019-slide-7.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-26181\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165319\/patching-strategy-rsac2019-slide-7.jpg\" alt=\"The researchers measured the relevance of the patching strategies against two metrics: efficiency and coverage\" width=\"1460\" height=\"820\" class=\"size-full wp-image-13045\"><\/a><p id=\"caption-attachment-26181\" class=\"wp-caption-text\">If this picture looks familiar, <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Precision_and_recall\" rel=\"noopener noreferrer nofollow\">that\u2019s probably because it\u2019s nothing new<\/a><\/p><\/div>\n<p>One of the generally accepted patching strategies is based on the Common Vulnerability Scoring System (CVSS), whereby priority is assigned to CVSS scores above a particular value. Calculating the efficiency and coverage for CVSS 10 gives 23% and 7%, respectively. Interestingly, the very same result (at least by these metrics) can be achieved by randomly installing patches.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165330\/patching-strategy-rsac2019-slide-8.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165330\/patching-strategy-rsac2019-slide-8.jpg\" alt=\"The strategy \" patch only vulnerabilities with cvss is as effective randomly installing patches width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13047\"><\/a><\/p>\n<p>The most common approach\u00a0\u2014 patch everything with a \u201chigh\u201d CVSS score (7 or above)\u00a0\u2014 produces markedly better results. This approach is not bad on the whole, but it\u2019s time-consuming because it means having to prioritize the installation of a large number of patches.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165340\/patching-strategy-rsac2019-slide-9.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165340\/patching-strategy-rsac2019-slide-9.jpg\" alt=\"Comparing the relevance of CVSS-based patching strategies\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13049\"><\/a><\/p>\n<p>An alternative strategy would be to prioritize patching by vendor. After all, developers have different ratios of the number of actual exploits to the total number of CVEs, so it would be logical to prioritize those whose products contain vulnerabilities that are more likely to be exploited in practice.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165351\/patching-strategy-rsac2019-slide-10.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165351\/patching-strategy-rsac2019-slide-10.jpg\" alt=\"Vulnerabilities in some vendors' products are more likely to be exploited than those in other vendors' products\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13051\"><\/a><\/p>\n<p>However, based on efficiency and coverage, this strategy turns out to be worse than random patching \u2014 it\u2019s about half as effective.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165402\/patching-strategy-rsac2019-slide-11.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165402\/patching-strategy-rsac2019-slide-11.jpg\" alt=\"Vendor-based strategies are far less effective than random patching\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13053\"><\/a><\/p>\n<p>So in the long run, this approach is even less relevant than one based on CVSS.<\/p>\n<h2>Probability computation model for vulnerability exploitation<\/h2>\n<p>This brings us back to the model built by the researchers. Comparing data from the CVE descriptions, publicly available exploit databases, and IPS\/IDS systems, the team was able to identify a set of signs influencing the probability of a vulnerability being exploited in practice.<\/p>\n<p>For example, on the one hand, signs such as a CVE reference from Microsoft, or the presence of an exploit in Metasploit, drastically increase the likelihood of exploitation of the vulnerability in question.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165413\/patching-strategy-rsac2019-slide-12.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165413\/patching-strategy-rsac2019-slide-12.jpg\" alt=\"The researchers identified signs influencing the probability of a vulnerability being exploited\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13055\"><\/a><\/p>\n<p>Some signs, on the other hand, reduce the probability of exploitation \u2014 such as a vulnerability being in the Safari browser, an exploit that was published in the ExploitDB database (which is not very convenient for practical purposes), the presence of the terms \u201cauthenticated\u201d or \u201cdouble free memory\u201d in the CVE descriptions, and others. Combining these factors, researchers could compute the probability of any particular vulnerability being exploited.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165424\/patching-strategy-rsac2019-slide-13.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165424\/patching-strategy-rsac2019-slide-13.jpg\" alt=\"Some signs increase the likelihood of vulnerability exploitation, others lower it\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13057\"><\/a><\/p>\n<p>To verify the accuracy of the model, the researchers compared their predictions with data from real attacks. Here\u2019s what they found:<\/p>\n<ul>\n<li>For vulnerabilities with minimal exploitation probability, the model works well.<\/li>\n<li>The model is inclined to overestimate the likelihood of exploitation for vulnerabilities with average predicted probability.<\/li>\n<li>For vulnerabilities with high exploitation probability, the model tends to underestimate the risk.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165435\/patching-strategy-rsac2019-slide-14.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165435\/patching-strategy-rsac2019-slide-14.jpg\" alt=\"The model is not perfect, but it works\" width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13059\"><\/a><\/p>\n<p>With that said, the model is not perfectly accurate, but it works on the whole. On this basis, the researchers created three patching strategies: highly efficient, balanced, and maximum coverage. The \u201cbalanced\u201d strategy, for example, achieves twice the efficiency of CVSS 7+ with better coverage (63% vs. 52%) and half the effort (that is, half the number of installed patches). Something worth considering, isn\u2019t it?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165445\/patching-strategy-rsac2019-slide-15.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/03\/26165445\/patching-strategy-rsac2019-slide-15.jpg\" alt=\"In comparison with CVSS 7+, the \" balanced strategy is twice as relevant with half the effort width=\"1460\" height=\"820\" class=\"aligncenter size-full wp-image-13061\"><\/a><\/p>\n<p>Lastly, some tips from the researchers about what to do:<\/p>\n<ul>\n<li>Think about whether you use anything other than CVSS in your patching strategy.<\/li>\n<li>Explore how open\/closed vulnerabilities are logged in your infrastructure.<\/li>\n<li>Start collecting data from your sensors about exploits used in attacks against your resources.<\/li>\n<li>When you have collected a significant amount of data, use it to calculate efficiency, coverage, and effort scores for your infrastructure.<\/li>\n<li>Compare the values with other prioritization strategies.<\/li>\n<\/ul>\n<p>We agree with the researchers that manually patching everything without a clear strategy is a waste of resources. However, our approach is a bit different: Kaspersky Systems Management (part of the Kaspersky Security for Business solution) employs vulnerability monitoring and patch installation subsystems.<\/p>\n<p>They make it possible to quickly identify, prioritize, and close vulnerabilities. In addition to CVSS scores, our prioritization uses information from the Kaspersky Security Network. For example, if our systems see that a vulnerability is currently being exploited, its priority increases. More details about the technology are available <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/systems-management\" rel=\"noopener noreferrer nofollow\">here<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.<\/p>\n","protected":false},"author":421,"featured_media":13031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,5,1917],"tags":[398,977,2059,1289,121,268],"class_list":{"0":"post-13030","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-news","9":"category-smb","10":"tag-patches","11":"tag-rsa-conference","12":"tag-rsa2019","13":"tag-rsac","14":"tag-updates","15":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/patching-strategy-rsa2019\/13030\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/patching-strategy-rsa2019\/15466\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/patching-strategy-rsa2019\/17410\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/patching-strategy-rsa2019\/15558\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/patching-strategy-rsa2019\/14250\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/patching-strategy-rsa2019\/18115\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/patching-strategy-rsa2019\/17094\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/patching-strategy-rsa2019\/22435\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/patching-strategy-rsa2019\/26176\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/patching-strategy-rsa2019\/11720\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/patching-strategy-rsa2019\/10523\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/patching-strategy-rsa2019\/18865\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/patching-strategy-rsa2019\/22875\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/patching-strategy-rsa2019\/23924\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/patching-strategy-rsa2019\/18128\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/patching-strategy-rsa2019\/22339\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/patching-strategy-rsa2019\/22275\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/rsac\/","name":"RSAC"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13030"}],"version-history":[{"count":17,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13030\/revisions"}],"predecessor-version":[{"id":14479,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13030\/revisions\/14479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13031"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}