Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Stop Chasing CVEs

Nemo
October 05, 2024

Stop Chasing CVEs

Waiting for vulnerability alerts to secure your systems is a flawed strategy. Did you spend time tracking down and patching systems for meltdown, shellshock, and log4j? So did I. I've also probably helped you track your product EOLs by creating endoflife.date.

This talk takes all of my experience and focuses on a single core learning - you need to stop chasing CVEs.

Here's the core argument:

1. CVEs are Too Late: They're after-the-fact alerts. By the time you know, so do attackers.
2. Upgrading Isn't Always an Option: Real-world constraints often make immediate patching a pipe dream.
3. You Can't Patch Everything: Sometimes, technical or operational hurdles make it impossible to fix known vulnerabilities.
4. Regular Updates Are Key: Ditch the CVE chase. Regular, proactive updates are your best defence.

The remainder of the talk will go into specific threat models and why enforcing proactive updates is the cleanest strategy. It will also go into why this isn't a silver-bullet either, but needs to be practised alongside other defence in depth measures.

Nemo

October 05, 2024
Tweet

More Decks by Nemo

Other Decks in Technology

Transcript

  1. About Me Founding Engineer @ Razorpay Creator, endoflife.date OSS Maintainer

    captnemo.in | blr.today Recurse Center Alum Takshashila Scholar Speedcuber, Homelabber, Niradhaar
  2. Aside 1: NIST/NVD/CVE Drama • NIST scaled back the NVD

    program in April 2024. • As of May 20, of all new vulnerabilities since February 93.4 percent remained unanalyzed. • NIST amended its five-year, $125 million IT contract with Maryland-based Analygence to include support for clearing the NVD backlog. • As of September 21, 2024, 72.4% of CVEs (18,358 CVEs) in the NVD have yet to be analyzed (compared to 93.4% as of May 19, 2024). https://www.theregister.com/2024/10/02/cve_pileup_nvd_missed_deadline/
  3. Aside 2: The CVE System is broken • NVD makes

    up vulnerability severity levels • CVE-2020-19909 is everything that is wrong with CVEs • NVD damage continued | daniel.haxx.se • CVEMITRECVSSNVDCNAOSS WTF - (Talk) • Resume-chasing CVEs Vulnerability Scanners do not get this nuance.
  4. Always run a supported release Upgrade Safely ❏ Have Better

    Tests ❏ Run a minimal distro ❏ Use distroless containers
  5. Always run a supported release Upgrade Safely ❏ Have Better

    Tests ❏ Run a minimal/rolling distro ❏ Use distroless containers Regularly ❏ Track your Inventory ❏ Track your Support Cycles ❏ Risk-rank your inventory ❏ Understand your Upgrade Paths.
  6. Supply Chain Security is moving fast • SBOM ecosystem is

    growing fast. • NIST/PCI/CIS/… Guidelines are evolving towards this reality. • Build a Inventory, but double check it. • Run your scanners, but don’t believe them on everything. • Don’t forget cloud versioned services (RDS/EKS/…)