New XM Cyber Analysis: 80% of Exposures from Misconfigurations, Much less Than 1% from CVEs

A brand new report from XM Cyber has discovered – amongst different insights – a dramatic hole between the place most organizations focus their safety efforts, and the place essentially the most critical threats truly reside.

The brand new report, Navigating the Paths of Threat: The State of Publicity Administration in 2024, is predicated on lots of of 1000’s of assault path assessments carried out by the XM Cyber platform throughout 2023. These assessments uncovered over 40 million exposures that affected hundreds of thousands of business-critical belongings. Anonymized information relating to these exposures was then supplied to the Cyentia Institute for impartial evaluation. To learn the total report, test it out right here.

Ebook Image

Obtain the report to find:

  • Key findings on the varieties of exposures placing organizations at best threat of breach.
  • The state of assault paths between on-prem and cloud networks.
  • Prime assault methods seen in 2023.
  • Easy methods to deal with what issues most, and remediate high-impact publicity dangers to your vital belongings.

The findings shine a vital gentle on the persevering with over-emphasis on remediating CVEs in cybersecurity packages. In reality, XM Cyber discovered that CVE-based vulnerabilities account for lower than 1% of the common organizations’ On-prem publicity panorama. Even when factoring in high-impact exposures that current a threat of compromise to business-critical belongings, these CVEs nonetheless signify solely a small proportion (11%) of the publicity threat profile.

The place does the lion’s share of threat truly lie? Let’s dig deeper into the outcomes:

CVEs: Not Essentially Exposures

When analyzing the On-premises infrastructure, of the overwhelming majority of organizations (86%) the XM Cyber report discovered, not surprisingly, that distant code executable vulnerabilities accounted (as talked about above) for lower than 1% of all exposures and solely 11% of vital exposures.

The analysis discovered that id and credential misconfigurations signify a staggering 80% of safety exposures throughout organizations, with a 3rd of those exposures placing vital belongings at direct threat of breach – a gaping assault vector actively being exploited by adversaries.

Thus, the report makes it clear that whereas patching vulnerabilities is vital, it is not sufficient. Extra prevalent threats like attackers poisoning shared folders with malicious code (taint shared content material) and utilizing frequent native credentials on a number of units expose a a lot bigger share of vital belongings (24%) in comparison with CVEs.

Thus, safety packages want to increase far past patching CVEs. Good cyber hygiene practices and a deal with mitigating choke factors and exposures like weak credential administration are essential.

image1

Do not Sweat Lifeless Ends, Hunt Excessive-Influence Choke Factors

Conventional safety tries to repair each vulnerability, however XM Cyber’s report reveals that 74% of exposures are literally lifeless ends for attackers – providing them minimal onward or lateral motion. This makes these vulnerabilities, exposures, and misconfiguration much less vital to your remediation efforts, permitting extra time to deal with the true points that current a validated risk to vital belongings.

The remaining 26% of publicity found within the report would enable adversaries to propagate their assaults onward towards vital belongings. The XM Cyber Assault Graph Evaluation(™) identifies the important thing intersections the place a number of assault paths towards vital belongings converge as “choke points”. The report highlights that solely 2% of exposures reside on “choke points”. Giving safety groups a much smaller subset of high-impact exposures to focus their remediation efforts on. These “choke points” – are highlighted in yellow & crimson on the graph under. They’re particularly harmful as a result of compromising only one can expose a good portion of vital belongings. In reality, the report discovered that 20% of choke factors expose 10% or extra of vital belongings. Thus, figuring out assault paths and homing in on high-risk choke factors may give defenders a much bigger bang for his or her buck – lowering threat way more effectively. To study extra about choke factors, take a look at this text.

image2

Discovering and Categorizing Exposures: Give attention to Essential Belongings

The place are exposures and the way do attackers exploit them? Historically, the assault floor is seen as every little thing within the IT atmosphere. Nevertheless, the report reveals that efficient safety requires understanding the place helpful belongings reside and the way they’re uncovered.

For instance, the report analyzes the distribution of potential assault factors throughout environments – discovering that not all entities are susceptible (see the graph under). A extra vital metric is publicity to vital belongings. Cloud environments maintain essentially the most vital asset exposures, adopted by Energetic Listing (AD) and IT/Community units.

It is price drilling down into the intense vulnerability of organizational AD. Energetic Listing stays the cornerstone of organizational id administration – but the report discovered that 80% of all safety exposures recognized stem from Energetic Listing misconfigurations or weaknesses. Much more regarding, one-third of all vital asset vulnerabilities might be traced again to id and credential issues inside Energetic Listing.

What is the takeaway right here? Safety groups are sometimes organized by vital asset classes. Whereas this could be adequate for managing the general variety of entities, it may miss the larger image. Essential exposures, although fewer, pose a a lot larger threat and require devoted focus. (To assist maintain you on monitor with addressing AD safety points, we advocate this helpful AD finest practices safety guidelines.)

image3

Completely different Wants for Completely different Industries

The report additionally analyzes differing cybersecurity dangers throughout industries. Industries with a higher variety of entities (potential assault factors) are likely to have extra vulnerabilities. Healthcare, for instance, has 5 occasions the publicity of Power and Utilities.

Nevertheless, the important thing threat metric is the proportion of exposures that threaten vital belongings. Right here, the image flips. Transportation and Power have a a lot larger proportion of vital exposures, regardless of having fewer general vulnerabilities. This implies they maintain a better focus of vital belongings that attackers may goal.

The takeaway is that totally different industries require totally different safety approaches. Monetary companies have extra digital belongings however a decrease vital publicity price in comparison with Power. Understanding the industry-specific assault floor and the threats it faces is essential for an efficient cybersecurity technique.

image4

The Backside Line

A closing key discovering demonstrates that publicity administration cannot be a one-time or annual challenge. It is an ever-changing, steady course of to drive enhancements. But right this moment’s over-focus on patching vulnerabilities (CVEs) results in neglect of extra prevalent threats.

At this time’s safety ecosystem and risk panorama will not be yesterday’s. It is time for a cybersecurity paradigm shift. As a substitute of patching each vulnerability, organizations have to prioritize the high-impact exposures that supply attackers vital onward and lateral motion inside a breached community – with a particular deal with the two% of exposures that reside on “choke points” the place remediating key weak spot in your atmosphere may have essentially the most optimistic discount in your general threat posture.

The time has come to maneuver past a check-the-box mentality and deal with real-world assault vectors.

Ebook Image

The State of Publicity Administration report’s findings are primarily based on information from the XM Cyber Steady Publicity Administration Platform that was analyzed independently by the Cyentia Institute. Seize your free report right here.

Be aware: This text was expertly written by Dale Fairbrother, Senior Product Advertising Supervisor at XM Cyber.

Discovered this text attention-grabbing? This text is a contributed piece from certainly one of our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles

INTERPOL Pushes for

Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is...

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

Dec 18, 2024Ravie LakshmananCyber Assault / Vulnerability Risk actors are...