Lesson From Pwn2Own: Focus On Exploitability

  /     /     /  
Publicated : 22/11/2024   Category : security


Lesson From Pwn2Own: Focus On Exploitability


Talented programmers can create attack code quickly, suggesting that firms need to focus on patching easily exploitable -- not just exploited -- flaws



The Pwn2Own contest earlier this month at the CanSecWest Conference showed off the speed with which knowledgeable security professionals can code exploits for known vulnerabilities.
While only two teams competed, it took them less than a day to create a workable exploit for each vulnerability selected by HP TippingPoint, which
ran the competition
. In some cases, the coders required only an hour or two. On the second day of the contest, for example, a team of researchers from security and offensive technology firm VUPEN
boasted on Twitter
: Here we go, another on-site exploit have been written by our team for IE (Internet Explorer) -- this one was challenging, it took us 4 hrs.
The speed that vulnerabilities could be exploited holds a lesson. While vulnerabilities that are actively being exploited should receive the highest priority for patching, the contest shows that the exploitability of a vulnerability -- not just the existence of an exploit -- should be considered as well, says Aaron Portnoy, manager of security research for HP TippingPoint.
The whole point of the public exploit part of Pwn2Own is to show that, yes, it really doesnt take that long to write an exploit for these, Portnoy says. Before the contest, there really wasnt any good data on how long it takes for someone to code an exploit. People now actually have that information.
While patching is an important security task, companies are overwhelmed by the deluge of vulnerabilities that they have to track on a regular basis, Portnoy says. Finding some metric to help prioritize which updates to test and deploy is important. While some researchers have suggested
a focus on finding weaknesses
in attack tools or attacker methodology that can inform defense, the working security manager needs a more immediate indicator of patch criticality.
Companies should obviously patch software that is being targeted by a publicly available exploit, Portnoy says. Yet, after emergency fixes, focusing on software vulnerabilities that vendors expect to be exploited quickly is the next step. The performance of teams such as VUPENs at Pwn2Own shows that it doesnt take long to go from zero to exploit.
We created six different exploits in less than 24 hours, which demonstrates that with enough resources and expertise, a team of motivated researchers can write reliable exploits in a very short time, says Chaouki Bekrar, CEO and head of research for VUPEN.
Moreover, companies need to assume that attackers may have already created attacks that use easy-to-exploit vulnerabilities and just have not released the details publicly, Bekrar says.
As functional exploits are often privately available but not public, companies should not take into account the availability ... of a public exploit in their patch management process, he says.
One major caveat: The systems that Pwn2Own contestants pitted themselves against were not the most secure. The contest used older versions of the targeted operating systems to make coding the exploits easier. Windows XP and the older version of the Mac OS X used in the competition did not have the same software hardening features, such as sandboxing and address space layout randomization (ASLR), built into the more modern version of those operating systems.
If they were going to go after a real target, they will have to overcome a lot of mitigation, HP TippingPoints Portnoy says.
Yet VUPENs demonstration of successful attacks against Chrome and Internet Explorer suggests that companies would be best-served by assuming attackers have the ability to overcome operating system defenses.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Lesson From Pwn2Own: Focus On Exploitability