When your security tools introduce security weaknesses

By Sam Curcuruto | November 23, 2021
Share:

On the heels of another zero-day vulnerability found in a security tool, we’ve been working with our customers to show them whether or not they have internet-exposed assets which are affected by that vulnerability.

There is often the misconception that attack surface management is focused only on website and web-app infrastructure. And for some tools, that is the focus.

Our worldview (and our solution to the hair-on-fire tasks around zero-day vulnerabilities) maintains the belief that everything that is exposed to the internet, including your security tools and appliances, must be cataloged and tested for security gaps and weaknesses.

It’s becoming more prevalent that security tools are used as initial access into organizations, even though it flies in the face of conventional wisdom. But more vulnerabilities in security tools and breaches associated with issues in the software supply chain show that it’s absolutely critical for everything in your attacker-exposed attack surface to be continuously monitored – including your cloud infrastructure, third-party partners, and, yes, your security vendors.

Visibility and testing of everything is key.

In this instance, our platform made it easy to understand if an organization was affected. When it was discovered that particular firewall and VPN appliances from Palo Alto Networks – which have to be internet-facing to allow users to connect – were vulnerable to remote code execution, security operations teams could quickly search their entire external attack surface to uncover whether or not they’re impacted by the new zero-day.

A screenshot showing a quick attack surface search for vulnerable PAN Firewalls affected by CVE-2021-3064.

This is just one example. Of course, tomorrow is another day and there will be new vulnerabilities in different software, devices, and infrastructure.

If you’d like this kind of visibility into your external attack surface and the assets that it consists of, reach out and we’ll gladly have a conversation around your attack surface management goals.

About Sam Curcuruto

Sam Curcuruto serves as Sr. Director of Product Marketing for CyCognito. He has spent a large chunk of his career in the attack surface management space and loves to discuss how taking an offensive approach in a defensive industry is the right choice, especially with today's threat landscape.

mobile

Start Eliminating Your Shadow Risk

Demo Request