Page 80 - Cyber Defense eMagazine August 2024
P. 80

Despite its potential for widespread impact, the complexity of exploiting regreSSHion and the availability
            of mitigations reduce  the immediate  risk. Organizations  are advised to patch critical assets, prioritizing
            internet-facing SSH servers.

            Analyzing a risk, by understanding  its criticality factors (preauth, default config, exploitability, popularity,
            etc)  is  the  way  to  tackle  the  problem  of a  “new  critical  vulnerability”  incident,  in  a very  efficient  way,
            similarly to how we broke down the EternalBlue and regreSSHion cases to their criticality factors.

            Beyond  analyzing the criticality  and regular  patching, a structured  response  to critical vulnerabilities  is
            essential  too.  First,  identify  all  affected  assets  to  prioritize  efforts,  focusing  on  internet-facing  and
            business-critical  assets  first.  Then,  automate  patching  where  possible  to  ensure  swift  and  effective
            remediation.  Remember,  the  goal is to avoid  panic,  assess  criticality  accurately,  and  act decisively  to
            protect your organization!

             We  have  broken  down  RCE  vulnerabilities  into  their  criticality  factors  to  provide  a  framework  for
            assessing  their  severity.  By  examining  case  studies  like  EternalBlue  and  regreSSHion,,  we  have
            highlighted what makes certain vulnerabilities more dangerous than others. The key takeaway is to stay
            informed, analyze risks carefully, and prioritize actions to maintain a robust security posture.

            .




            About the Author

            Jonathan  Jacobi  is part  of the  CTO  office  at cybersecurity  startup  Dazz.  He
            focuses on product  development and innovation within the company. Coming
            from a wide background in the cybersecurity field, Jonathan started his college
            degree  in  computer  science  as  a  13-year-old,  worked  as  a  Vulnerability
            Researcher  at  Check  Point  Research,  and  was  the  youngest  Microsoft
            employee as part of Microsoft’s MSRC.

            In his military service, Jonathan served in the Elite Israeli Cyber & Intelligence
            Unit, 8200, in various security research and leadership positions.


            Jonathan’s hands-on experience ranges from real-world security research and
            finding  0-day vulnerabilities  to speaking  at world-renowned  events like TEDx
            and  CCC  (Chaos  Communication  Congress).  He  is  also  a  Co-Founder  of
            Perfect Blue,  ranked as the #1 hacking (CTF) team  in the world (2020-2021,
            2023). Jonathan can be reached online at [email protected]  |  https://twitter.com/j0nathanj  and at Dazz’
            website https://www.dazz.io/who-we-are












            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          80
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   75   76   77   78   79   80   81   82   83   84   85