© 2019 Synopsys, Inc. 1
Delivering a Next-Generation Vulnerability Feed
The Advent of BDSA and the State of Vulnerability Reporting
Synopsys Software Integrity Group 2019
© 2019 Synopsys, Inc. 2
Introduction
Siobhan Hunter, BDSR (Black Duck Security Research)
• The BDSR (Black Duck Security Research)
team forms part of the Synopsys
Cybersecurity Research Centre (CyRC).
• We are tasked with identifying and
researching reported vulnerabilities in open
source software.
• We currently deliver our Black Duck Security
Advisories (BDSAs) feed to customers via the
Hub.
© 2019 Synopsys, Inc. 3
Agenda
Introduction and a little background
• BDSA: A gourmet feed
Showcase BDSAs
• ImageMagick
• LibreOffice
• Apache CouchDB
Enhanced research projects
• Apache Struts
Summary
© 2019 Synopsys, Inc. 4
BDSA: A little background
Vulnerability analysis at Black Duck Security Research (BDSR)
© 2019 Synopsys, Inc. 5
Yet another feed?
Source Vulnerabilities
SourceClear Vulnerability Database 2,031,202 vulnerabilities
National Vulnerability Database (NVD) 84,795 vulnerabilities reported since 2009
VulnDB 135,908 entries
Snyck 74% more vulnerabilities than NVD
Rapid7 47,902 exploitable vulnerabilities
Security Focus >100,000 vulnerabilities
© 2019 Synopsys, Inc. 6
Vulnerability analysis at BDSR
Beyond the rest
What does Synopsys do differently?
• Harness this firehose of vulnerability data
• Create a finely tuned feed of vulnerability reports
• Verify the accuracy of the vulnerability report
• Focus on the vulnerabilities that are relevant to our customers
What do we deliver?
Security advisories that are
• Selected
• Prioritized
• Researched
• Delivered with same-day notification
What’s so great about BDSAs?
• Consistency and high-quality information
• CVE agnostic: if it affects customer components, we cover it
• Actionable mitigation, workaround, and remediation guidance
• Direct mapping to affected applications for rapid evaluation of risk exposure
• CVSS 2.0/3.0 severity scoring
© 2019 Synopsys, Inc. 7
Setting the scene
The raw material for vulnerability research
How are OS vulnerabilities currently reported?
• Vulnerabilities are reported in hundreds of places across the internet
• Some are discovered and reported by CVE Numbering Authorities (CNAs)
• Some researchers exercise responsible disclosure, some don’t
I N D E P E N D E N T
R E S E A R C H E R S
V E N D O R S & P R O J E C T S
A G G R E G AT O R S
B O U N T Y S I T E S
© 2019 Synopsys, Inc. 8
Selecting our ingredients
The harvesting of sources
We have carefully curated the list of sources we use
throughout the lifetime of the project.
We use various criteria to determine specific
sources, such as:
• Components used by our customers (based on
telemetry from KB)
• Coverage of CNA organizations
• Signal-to-noise ratio of the source
• Quality of the information provided
We continuously refine our source processing.
© 2019 Synopsys, Inc. 10
Our recipe for quality and consistency
Customer requests
• Requests for clarification
• Verification of scoring
• In-depth research
• Check affected version ranges
• Additional component coverage
© 2019 Synopsys, Inc. 12
BDSA: Worked examples
ImageMagick CVE-2019-7395
LibreOffice CVE-2018-16858
Apache CouchDB
© 2019 Synopsys, Inc. 13
ImageMagick CVE-2019-7395
Case Study 1
Reported in GitHub 5 Feb. 2019
© 2019 Synopsys, Inc. 14
ImageMagick CVE-2019-7395
Case Study 1
Reported in Bugzilla on
the same day
© 2019 Synopsys, Inc. 15
ImageMagick CVE-2019-7395
Case Study 1
Subsequently replicated across all the
advisory fora
© 2019 Synopsys, Inc. 16
© 2019 Synopsys, Inc. 17
© 2019 Synopsys, Inc. 18
© 2019 Synopsys, Inc. 19
© 2019 Synopsys, Inc. 20
ImageMagick CVE-2019-7395
Case Study 1
CVSS2 Base Score 5.0 (Medium)
CVSS3 Base Score 5.3 (Medium)
With Temporal Metrics 3.2 (Low)
CVSS3 with Temporal 4.6 (Low)
© 2019 Synopsys, Inc. 21
ImageMagick CVE-2019-7395
Case Study 1
What does “added value” mean for our customers?
• Immediately accessible details in title and overview description
• Thorough technical treatment of vulnerable code and attack vectors
• Thorough research and reporting of vulnerable version range
• Immediate actionable information regarding fix commits, fixed releases, relevant references, and
embedded links
• Both CWE and CAPEC classifications
• Accurate extended scoring that includes base and temporal metrics
© 2019 Synopsys, Inc. 22
Importance of uniformity and the human touch
© 2019 Synopsys, Inc. 23
LibreOffice CVE-2018-16858
Case Study 2
© 2019 Synopsys, Inc. 24
ImageMagick CVE-2019-7395
Case Study 1
And subsequently replicated across all
the advisory fora2019
© 2019 Synopsys, Inc. 25
© 2019 Synopsys, Inc. 26
LibreOffice CVE-2018-16858
Case Study 2
© 2019 Synopsys, Inc. 27
LibreOffice CVE-2018-16858
Case Study 2
NVD analysis published over 7
weeks later on 27 March
At any given time, we have numerous completed BDSAs in KB with a CVE but no corresponding NVD entry
These are reserved CVE numbers allocated by CNAs (CVE Numbering Authorities)
All are ranked (i.e., have appeared in customer BOMs)
© 2019 Synopsys, Inc. 28
Apache CouchDB
Case Study 3
© 2019 Synopsys, Inc. 29
Apache CouchDB
Case Study 3
• Many vulnerabilities for popular components do not get allocated CVEs
• BDSAs are created as a matter of priority
• Historically, these vulnerabilities have been actively added to the BDSA stock
• Why has this become prevalent?
Vulnerabilities with no allocated CVE represent
20%–25% of our overall BDSAs
© 2019 Synopsys, Inc. 30
Threat Research Information (TRI) reports
What is a TRI report?
The tale of CVE-2018-11776
© 2019 Synopsys, Inc. 31
TRI reports
What is a TRI report?
• Deep-dive research into selected vulnerabilities
• Comprehensive analysis based on replication and study of the vulnerability and its exploitation
• Confirms vulnerability details, most especially the affected versions
Which vulnerabilities get this in-depth treatment?
• Customer requests
• Vulnerabilities for which further research is needed to accurately identify the details
• Vulnerabilities likely to affect a wide range of products
• Vulnerabilities with a high profile (media coverage)
© 2019 Synopsys, Inc. 32
TRI reports
What do they contain?
What a regular TRI report contains:
• Details of the vulnerability
• Common scenarios
• Reproduction environment
• Proof-of-concept and findings
• Confirmation of fixed versions of the affected
component
• Confirmation of vulnerable versions
• Mitigation methods
• Detection: IoC, IoA
• Collection of relevant data
© 2019 Synopsys, Inc. 33
Apache Struts CVE-2018-11776
TRI report results
Apache Struts Security Advisory before 24 Sept. 2018
BDSR research results:
23 new vulnerable versions discovered
New affected version ranges:
Struts 2.0.4–2.3.34
© 2019 Synopsys, Inc. 34
Apache Struts due diligence research
Component validation and vulnerability verification
Scope
• 57 Apache Struts Security Advisories
• Representing 64 individual vulnerabilities
• Across 115 versions of Apache Struts 2
Research
• Vulnerabilities verified across 115 versions of Apache Struts 2
• Remote code execution vulns confirmed
• Denial-of-service vulns qualified
• Identification of false positives and false negatives
Findings
• 61 additional unique vulnerable Struts versions
• 24 official Apache advisories with incorrect vulnerable version ranges
© 2019 Synopsys, Inc. 35
So to summarise…
© 2019 Synopsys, Inc. 36
Issues we are addressing
Reasons to rave about BDSAs
• Incomplete data: consumers need to be informed and armed with the knowledge they
need to make accurate data-driven decisions when addressing vulnerabilities
• Inconsistent scoring, lack of temporal considerations
• Uncertainties, ambiguities, and obfuscation through low-quality reporting
• Expensive vulnerability investigation
• Slowness in reporting
• Irrelevant information: no targeted customer-centric focus
• Lack of diligence, governance, truth-finding
• Lack of engagement
© 2019 Synopsys, Inc. 37
Tangible benefits to our customers
Reasons to rave about BDSAs
• Quality and consistency
• Completeness: research thoroughness = more relevant actionable content than other
feeds
• Accuracy: time taken to ensure information is correct and independently checked
• Speed: as fast as any, faster than most
• Individually penned by a vulnerability analyst: no copy-paste, no corners cut
• Customer-centric research prioritisation
• Precision approach to vulnerability coverage
Thank You

More Related Content

PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–That is Not How This Works
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Webinar – Security Tool Misconfiguration and Abuse
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Using Evidence-Based Security
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–You've Got Your Open Source Audit Report–Now What?
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–That is Not How This Works
Webinar–5 ways to risk rank your vulnerabilities
Webinar – Security Tool Misconfiguration and Abuse

What's hot (18)

PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Webinar–2019 Open Source Risk Analysis Report
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Webinar–Open Source Risk in M&A by the Numbers
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Preventing Code Leaks & Other Critical Security Risks from Code
PPTX
Automate and Enhance Application Security Analysis
PDF
Webinar–AppSec: Hype or Reality
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PDF
Cyber Security 4.0 conference 30 November 2016
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Best Practices for DevSecOps at Scale
Webinar–What You Need To Know About Open Source Licensing
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–The 2019 Open Source Year in Review
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–The State of Open Source in M&A Transactions
Webinar–2019 Open Source Risk Analysis Report
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Webinar–Open Source Risk in M&A by the Numbers
Tomorrow Starts Here - Security Everywhere
Preventing Code Leaks & Other Critical Security Risks from Code
Automate and Enhance Application Security Analysis
Webinar–AppSec: Hype or Reality
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Cyber Security 4.0 conference 30 November 2016
Ad

Similar to Webinar–Delivering a Next Generation Vulnerability Feed (20)

PPTX
Automate and Enhance Application Security Analysis
PPTX
Software Bill of Materials and the Vulnerability Exploitability eXchange
PDF
Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities
PDF
Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vuln...
PPTX
Vulnerability Intelligence and Assessment with vulners.com
PDF
CyberCentral Summit 2018 in Prague
PDF
Donu’t Let Vulnerabilities Create a Hole in Your Organization
PPTX
Vulnerability assessment and penetration testing
PPT
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
PDF
CRA - overview of vulnerability handling
PDF
PCI and Vulnerability Assessments - What’s Missing?
PPTX
September 13, 2016: Security in the Age of Open Source:
PPTX
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
PPTX
PHDays 8: Vulnerability Databases. Sifting thousands tons of verbal ore
PDF
Edgescan 2022 Vulnerability Statistics Report
PDF
2022 Vulnerability Statistics Report.pdf
PPTX
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
PPTX
Vulnerability Assessment
PDF
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
Automate and Enhance Application Security Analysis
Software Bill of Materials and the Vulnerability Exploitability eXchange
Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities
Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vuln...
Vulnerability Intelligence and Assessment with vulners.com
CyberCentral Summit 2018 in Prague
Donu’t Let Vulnerabilities Create a Hole in Your Organization
Vulnerability assessment and penetration testing
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
CRA - overview of vulnerability handling
PCI and Vulnerability Assessments - What’s Missing?
September 13, 2016: Security in the Age of Open Source:
Mining Software Repositories for Security: Data Quality Issues Lessons from T...
PHDays 8: Vulnerability Databases. Sifting thousands tons of verbal ore
Edgescan 2022 Vulnerability Statistics Report
2022 Vulnerability Statistics Report.pdf
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Vulnerability Assessment
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
Ad

More from Synopsys Software Integrity Group (11)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Infographic–A Look Back at the First Year of GDPR
PPTX
Webinar–Reviewing Modern JavaScript Applications
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Software Security 2019–Embrace Velocity
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Risk-based adaptive DevSecOps
Webinar–Vulnerabilities in Containerised Production Environments
Infographic–A Look Back at the First Year of GDPR
Webinar–Reviewing Modern JavaScript Applications

Recently uploaded (20)

PPTX
Chapter 1 - Transaction Processing and Mgt.pptx
PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
PDF
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
PDF
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
PPTX
Download Adobe Photoshop Crack 2025 Free
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PDF
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
DOC
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
PPTX
Lecture 5 Software Requirement Engineering
PPTX
Bista Solutions Advanced Accounting Package
PPTX
hospital managemt ,san.dckldnklcdnkdnkdnjadnjdjn
PPTX
Presentation by Samna Perveen And Subhan Afzal.pptx
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
PPTX
Human-Computer Interaction for Lecture 2
PDF
Guide to Food Delivery App Development.pdf
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PPTX
R-Studio Crack Free Download 2025 Latest
Chapter 1 - Transaction Processing and Mgt.pptx
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
Download Adobe Photoshop Crack 2025 Free
BoxLang Dynamic AWS Lambda - Japan Edition
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
Lecture 5 Software Requirement Engineering
Bista Solutions Advanced Accounting Package
hospital managemt ,san.dckldnklcdnkdnkdnjadnjdjn
Presentation by Samna Perveen And Subhan Afzal.pptx
Viber For Windows 25.7.1 Crack + Serial Keygen
Human-Computer Interaction for Lecture 2
Guide to Food Delivery App Development.pdf
Practical Indispensable Project Management Tips for Delivering Successful Exp...
R-Studio Crack Free Download 2025 Latest

Webinar–Delivering a Next Generation Vulnerability Feed

  • 1. © 2019 Synopsys, Inc. 1 Delivering a Next-Generation Vulnerability Feed The Advent of BDSA and the State of Vulnerability Reporting Synopsys Software Integrity Group 2019
  • 2. © 2019 Synopsys, Inc. 2 Introduction Siobhan Hunter, BDSR (Black Duck Security Research) • The BDSR (Black Duck Security Research) team forms part of the Synopsys Cybersecurity Research Centre (CyRC). • We are tasked with identifying and researching reported vulnerabilities in open source software. • We currently deliver our Black Duck Security Advisories (BDSAs) feed to customers via the Hub.
  • 3. © 2019 Synopsys, Inc. 3 Agenda Introduction and a little background • BDSA: A gourmet feed Showcase BDSAs • ImageMagick • LibreOffice • Apache CouchDB Enhanced research projects • Apache Struts Summary
  • 4. © 2019 Synopsys, Inc. 4 BDSA: A little background Vulnerability analysis at Black Duck Security Research (BDSR)
  • 5. © 2019 Synopsys, Inc. 5 Yet another feed? Source Vulnerabilities SourceClear Vulnerability Database 2,031,202 vulnerabilities National Vulnerability Database (NVD) 84,795 vulnerabilities reported since 2009 VulnDB 135,908 entries Snyck 74% more vulnerabilities than NVD Rapid7 47,902 exploitable vulnerabilities Security Focus >100,000 vulnerabilities
  • 6. © 2019 Synopsys, Inc. 6 Vulnerability analysis at BDSR Beyond the rest What does Synopsys do differently? • Harness this firehose of vulnerability data • Create a finely tuned feed of vulnerability reports • Verify the accuracy of the vulnerability report • Focus on the vulnerabilities that are relevant to our customers What do we deliver? Security advisories that are • Selected • Prioritized • Researched • Delivered with same-day notification What’s so great about BDSAs? • Consistency and high-quality information • CVE agnostic: if it affects customer components, we cover it • Actionable mitigation, workaround, and remediation guidance • Direct mapping to affected applications for rapid evaluation of risk exposure • CVSS 2.0/3.0 severity scoring
  • 7. © 2019 Synopsys, Inc. 7 Setting the scene The raw material for vulnerability research How are OS vulnerabilities currently reported? • Vulnerabilities are reported in hundreds of places across the internet • Some are discovered and reported by CVE Numbering Authorities (CNAs) • Some researchers exercise responsible disclosure, some don’t I N D E P E N D E N T R E S E A R C H E R S V E N D O R S & P R O J E C T S A G G R E G AT O R S B O U N T Y S I T E S
  • 8. © 2019 Synopsys, Inc. 8 Selecting our ingredients The harvesting of sources We have carefully curated the list of sources we use throughout the lifetime of the project. We use various criteria to determine specific sources, such as: • Components used by our customers (based on telemetry from KB) • Coverage of CNA organizations • Signal-to-noise ratio of the source • Quality of the information provided We continuously refine our source processing.
  • 9. © 2019 Synopsys, Inc. 10 Our recipe for quality and consistency Customer requests • Requests for clarification • Verification of scoring • In-depth research • Check affected version ranges • Additional component coverage
  • 10. © 2019 Synopsys, Inc. 12 BDSA: Worked examples ImageMagick CVE-2019-7395 LibreOffice CVE-2018-16858 Apache CouchDB
  • 11. © 2019 Synopsys, Inc. 13 ImageMagick CVE-2019-7395 Case Study 1 Reported in GitHub 5 Feb. 2019
  • 12. © 2019 Synopsys, Inc. 14 ImageMagick CVE-2019-7395 Case Study 1 Reported in Bugzilla on the same day
  • 13. © 2019 Synopsys, Inc. 15 ImageMagick CVE-2019-7395 Case Study 1 Subsequently replicated across all the advisory fora
  • 14. © 2019 Synopsys, Inc. 16
  • 15. © 2019 Synopsys, Inc. 17
  • 16. © 2019 Synopsys, Inc. 18
  • 17. © 2019 Synopsys, Inc. 19
  • 18. © 2019 Synopsys, Inc. 20 ImageMagick CVE-2019-7395 Case Study 1 CVSS2 Base Score 5.0 (Medium) CVSS3 Base Score 5.3 (Medium) With Temporal Metrics 3.2 (Low) CVSS3 with Temporal 4.6 (Low)
  • 19. © 2019 Synopsys, Inc. 21 ImageMagick CVE-2019-7395 Case Study 1 What does “added value” mean for our customers? • Immediately accessible details in title and overview description • Thorough technical treatment of vulnerable code and attack vectors • Thorough research and reporting of vulnerable version range • Immediate actionable information regarding fix commits, fixed releases, relevant references, and embedded links • Both CWE and CAPEC classifications • Accurate extended scoring that includes base and temporal metrics
  • 20. © 2019 Synopsys, Inc. 22 Importance of uniformity and the human touch
  • 21. © 2019 Synopsys, Inc. 23 LibreOffice CVE-2018-16858 Case Study 2
  • 22. © 2019 Synopsys, Inc. 24 ImageMagick CVE-2019-7395 Case Study 1 And subsequently replicated across all the advisory fora2019
  • 23. © 2019 Synopsys, Inc. 25
  • 24. © 2019 Synopsys, Inc. 26 LibreOffice CVE-2018-16858 Case Study 2
  • 25. © 2019 Synopsys, Inc. 27 LibreOffice CVE-2018-16858 Case Study 2 NVD analysis published over 7 weeks later on 27 March At any given time, we have numerous completed BDSAs in KB with a CVE but no corresponding NVD entry These are reserved CVE numbers allocated by CNAs (CVE Numbering Authorities) All are ranked (i.e., have appeared in customer BOMs)
  • 26. © 2019 Synopsys, Inc. 28 Apache CouchDB Case Study 3
  • 27. © 2019 Synopsys, Inc. 29 Apache CouchDB Case Study 3 • Many vulnerabilities for popular components do not get allocated CVEs • BDSAs are created as a matter of priority • Historically, these vulnerabilities have been actively added to the BDSA stock • Why has this become prevalent? Vulnerabilities with no allocated CVE represent 20%–25% of our overall BDSAs
  • 28. © 2019 Synopsys, Inc. 30 Threat Research Information (TRI) reports What is a TRI report? The tale of CVE-2018-11776
  • 29. © 2019 Synopsys, Inc. 31 TRI reports What is a TRI report? • Deep-dive research into selected vulnerabilities • Comprehensive analysis based on replication and study of the vulnerability and its exploitation • Confirms vulnerability details, most especially the affected versions Which vulnerabilities get this in-depth treatment? • Customer requests • Vulnerabilities for which further research is needed to accurately identify the details • Vulnerabilities likely to affect a wide range of products • Vulnerabilities with a high profile (media coverage)
  • 30. © 2019 Synopsys, Inc. 32 TRI reports What do they contain? What a regular TRI report contains: • Details of the vulnerability • Common scenarios • Reproduction environment • Proof-of-concept and findings • Confirmation of fixed versions of the affected component • Confirmation of vulnerable versions • Mitigation methods • Detection: IoC, IoA • Collection of relevant data
  • 31. © 2019 Synopsys, Inc. 33 Apache Struts CVE-2018-11776 TRI report results Apache Struts Security Advisory before 24 Sept. 2018 BDSR research results: 23 new vulnerable versions discovered New affected version ranges: Struts 2.0.4–2.3.34
  • 32. © 2019 Synopsys, Inc. 34 Apache Struts due diligence research Component validation and vulnerability verification Scope • 57 Apache Struts Security Advisories • Representing 64 individual vulnerabilities • Across 115 versions of Apache Struts 2 Research • Vulnerabilities verified across 115 versions of Apache Struts 2 • Remote code execution vulns confirmed • Denial-of-service vulns qualified • Identification of false positives and false negatives Findings • 61 additional unique vulnerable Struts versions • 24 official Apache advisories with incorrect vulnerable version ranges
  • 33. © 2019 Synopsys, Inc. 35 So to summarise…
  • 34. © 2019 Synopsys, Inc. 36 Issues we are addressing Reasons to rave about BDSAs • Incomplete data: consumers need to be informed and armed with the knowledge they need to make accurate data-driven decisions when addressing vulnerabilities • Inconsistent scoring, lack of temporal considerations • Uncertainties, ambiguities, and obfuscation through low-quality reporting • Expensive vulnerability investigation • Slowness in reporting • Irrelevant information: no targeted customer-centric focus • Lack of diligence, governance, truth-finding • Lack of engagement
  • 35. © 2019 Synopsys, Inc. 37 Tangible benefits to our customers Reasons to rave about BDSAs • Quality and consistency • Completeness: research thoroughness = more relevant actionable content than other feeds • Accuracy: time taken to ensure information is correct and independently checked • Speed: as fast as any, faster than most • Individually penned by a vulnerability analyst: no copy-paste, no corners cut • Customer-centric research prioritisation • Precision approach to vulnerability coverage