Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1544,"date":"2023-11-01T00:50:25","date_gmt":"2023-11-01T00:50:25","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/"},"modified":"2023-11-01T00:50:25","modified_gmt":"2023-11-01T00:50:25","slug":"determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/","title":{"rendered":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm"},"content":{"rendered":"

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on.<\/p>\n

More\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on.<\/p>\n

More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having event data from multiple security applications comes when you can combine two or more sources to uncover new insights about your security posture.<\/p>\n

For example, let\u2019s take a look at what happens when we take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in IPS telemetry from Cisco Secure Firewall.<\/p>\n

This is something that you can do yourself if you have these Cisco products. Start by looking up the latest threat intelligence data in Cisco Vulnerability Management, and then gather Snort IPS rule data for vulnerabilities that have alerted on your Secure Firewall. Compare the two and you may be surprised with what you find.<\/p>\n

Collect the vulnerability threat intelligence<\/strong><\/h2>\n

It\u2019s very easy to stay on top of a variety of vulnerability trends using the API Reference that is available in Cisco Vulnerability Management Premier tier. For this example, we\u2019ll use a prebuilt API call, available in the API Reference<\/a>.<\/p>\n\n

This API call allows you to set a risk score and choose from a handful of filters that can indicate that a vulnerability is a higher risk:<\/p>\n

Active Internet Breach\u2014The vulnerability has been used in breach activity in the wild.
\nEasily Exploitable\u2014It is not difficult to successfully exploit the vulnerability.
\nRemote Code Execution\u2014If exploited, the vulnerability allows for arbitrary code to be run on the compromised system from a remote location.<\/p>\n

To obtain a list of high-risk CVEs, we\u2019ll set the risk score to 100, enable these three filters, and then run a query.<\/p>\n\n

With the output list in hand, let\u2019s go see which of these are triggering IPS alerts on our Secure Firewall.<\/p>\n

Obtaining IPS telemetry from Secure Firewall is easy and there are a several of ways that you can organize and export this data. (Setting up reporting is beyond the scope of this example, \u00a0but is covered in the Cisco Secure Firewall Management Center Administration Guide<\/a>.) In this case we will look at the total number of alerts seen for rules associated with CVEs.<\/p>\n

Naturally, if you\u2019re doing this within your own organization, you\u2019ll be looking at alerts seen from firewalls that are part of your network. Our example here will be slightly different in that we\u2019ll look across alerts from organizations that have opted in to share their Secure Firewall telemetry with us. The analysis is similar in either case, but the added bonus with our example is that we\u2019re able to look at a larger swath of activity across the threat landscape.<\/p>\n

Let\u2019s filter the IPS telemetry by the CVEs pulled from the Cisco Vulnerability Management API. You can do this analysis with whatever data analytics tool you prefer. The result in this case is a top ten list of high-risk CVEs that Secure Firewall has alerted on.<\/p>\n

CVE<\/strong>
\nDescription<\/strong>
\n1
\nCVE-2021-44228
\nApache Log4j logging remote code execution attempt
\n2
\nCVE-2018-11776
\nApache Struts OGNL getRuntime.exec static method access attempt
\n3
\nCVE-2014-6271
\nBash CGI environment variable injection attempt
\n4
\nCVE-2022-26134
\nAtlassian Confluence OGNL expression injection attempt
\n5
\nCVE-2022-22965
\nJava ClassLoader access attempt
\n6
\nCVE-2014-0114
\nJava ClassLoader access attempt
\n7
\nCVE-2017-9791
\nApache Struts remote code execution attempt (Struts 1 plugin)
\n8
\nCVE-2017-5638
\nApache Struts remote code execution attempt (Jakarta Multipart parser)
\n9
\nCVE-2017-12611
\nApache Struts remote code execution attempt (Freemaker tag)
\n10
\nCVE-2016-3081
\nApache Struts remote code execution attempt (Dynamic Method Invocation)<\/p>\n

What\u2019s interesting here is that, while this is a list of ten unique CVEs, there are only five unique applications here. In particular, Apache Struts comprises 5 of the top 10.<\/p>\n

By ensuring that these five applications are fully patched, you cover the top ten most frequently exploited vulnerabilities that have RCEs, are easily exploitable, and are known to be used in active internet breaches.<\/p>\n

In many ways analysis like this can greatly simplify the process of deciding what to patch. Want to simplify the process even further? Here are a few things to help.<\/p>\n

Check out the Cisco Vulnerability Management API<\/a> for descriptions of various API calls and make sample code that you can use, written from your choice of programming languages.<\/p>\n

Want to run the analysis outlined here? Some basic Python code that includes the API calls, plus a bit of code to save the results, is available here on Github<\/a>. Information on the CVEs associated with various Snort rules can be found in the Snort Rule Documentation<\/a>.<\/p>\n

We hope this example is helpful. This is a fairly basic model, as it\u2019s meant for illustrative purposes, so feel free to tune the model to best suit your needs. And hopefully combining these sources provides you with further insight into your security posture.<\/p>\n

Methodology<\/strong><\/h2>\n

This analysis looks at the standard text rules and Shared Object rules<\/a> in Snort, both provided by Talos. We compared data sets using Tableau, looking at Snort signatures that only belong to the Connectivity over Security, Balanced, and Security over Connectivity base policies.<\/p>\n

The IPS data we\u2019re using comes from Snort IPS instances included with Cisco Secure Firewall. The data set covers June 1-30, 2023, and the Cisco Vulnerability Management API calls were performed in early July 2023.<\/p>\n

Looking at the total number of alerts will show us which rules alert the most frequently. In-and-of-itself this isn\u2019t a great indicator of severity, as some rules cause more alerts than others. This is also why we\u2019ve looked at the percentage of organizations that see an alert in past analysis<\/a> instead. However, this time we compared the total number of alerts against a list of vulnerabilities that we know are severe thanks to the risk score and other variables. This makes the total number of alerts more meaningful within this context.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on.<\/p>\n

More\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on.<\/p>\n

More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having event data from multiple security applications comes when you can combine two or more sources to uncover new insights about your security posture.<\/p>\n

For example, let\u2019s take a look at what happens when we take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in IPS telemetry from Cisco Secure Firewall.<\/p>\n

This is something that you can do yourself if you have these Cisco products. Start by looking up the latest threat intelligence data in Cisco Vulnerability Management, and then gather Snort IPS rule data for vulnerabilities that have alerted on your Secure Firewall. Compare the two and you may be surprised with what you find.<\/p>\n

Collect the vulnerability threat intelligence<\/strong><\/h2>\n

It\u2019s very easy to stay on top of a variety of vulnerability trends using the API Reference that is available in Cisco Vulnerability Management Premier tier. For this example, we\u2019ll use a prebuilt API call, available in the API Reference<\/a>.<\/p>\n

This API call allows you to set a risk score and choose from a handful of filters that can indicate that a vulnerability is a higher risk:<\/p>\n

Active Internet Breach\u2014The vulnerability has been used in breach activity in the wild.
\nEasily Exploitable\u2014It is not difficult to successfully exploit the vulnerability.
\nRemote Code Execution\u2014If exploited, the vulnerability allows for arbitrary code to be run on the compromised system from a remote location.<\/p>\n

To obtain a list of high-risk CVEs, we\u2019ll set the risk score to 100, enable these three filters, and then run a query.<\/p>\n

With the output list in hand, let\u2019s go see which of these are triggering IPS alerts on our Secure Firewall.<\/p>\n

Obtaining IPS telemetry from Secure Firewall is easy and there are a several of ways that you can organize and export this data. (Setting up reporting is beyond the scope of this example, \u00a0but is covered in the Cisco Secure Firewall Management Center Administration Guide<\/a>.) In this case we will look at the total number of alerts seen for rules associated with CVEs.<\/p>\n

Naturally, if you\u2019re doing this within your own organization, you\u2019ll be looking at alerts seen from firewalls that are part of your network. Our example here will be slightly different in that we\u2019ll look across alerts from organizations that have opted in to share their Secure Firewall telemetry with us. The analysis is similar in either case, but the added bonus with our example is that we\u2019re able to look at a larger swath of activity across the threat landscape.<\/p>\n

Let\u2019s filter the IPS telemetry by the CVEs pulled from the Cisco Vulnerability Management API. You can do this analysis with whatever data analytics tool you prefer. The result in this case is a top ten list of high-risk CVEs that Secure Firewall has alerted on.<\/p>\n

CVE<\/strong>
\nDescription<\/strong>
\n1
\nCVE-2021-44228
\nApache Log4j logging remote code execution attempt
\n2
\nCVE-2018-11776
\nApache Struts OGNL getRuntime.exec static method access attempt
\n3
\nCVE-2014-6271
\nBash CGI environment variable injection attempt
\n4
\nCVE-2022-26134
\nAtlassian Confluence OGNL expression injection attempt
\n5
\nCVE-2022-22965
\nJava ClassLoader access attempt
\n6
\nCVE-2014-0114
\nJava ClassLoader access attempt
\n7
\nCVE-2017-9791
\nApache Struts remote code execution attempt (Struts 1 plugin)
\n8
\nCVE-2017-5638
\nApache Struts remote code execution attempt (Jakarta Multipart parser)
\n9
\nCVE-2017-12611
\nApache Struts remote code execution attempt (Freemaker tag)
\n10
\nCVE-2016-3081
\nApache Struts remote code execution attempt (Dynamic Method Invocation)<\/p>\n

What\u2019s interesting here is that, while this is a list of ten unique CVEs, there are only five unique applications here. In particular, Apache Struts comprises 5 of the top 10.<\/p>\n

By ensuring that these five applications are fully patched, you cover the top ten most frequently exploited vulnerabilities that have RCEs, are easily exploitable, and are known to be used in active internet breaches.<\/p>\n

In many ways analysis like this can greatly simplify the process of deciding what to patch. Want to simplify the process even further? Here are a few things to help.<\/p>\n

Check out the Cisco Vulnerability Management API<\/a> for descriptions of various API calls and make sample code that you can use, written from your choice of programming languages.<\/p>\n

Want to run the analysis outlined here? Some basic Python code that includes the API calls, plus a bit of code to save the results, is available here on Github<\/a>. Information on the CVEs associated with various Snort rules can be found in the Snort Rule Documentation<\/a>.<\/p>\n

We hope this example is helpful. This is a fairly basic model, as it\u2019s meant for illustrative purposes, so feel free to tune the model to best suit your needs. And hopefully combining these sources provides you with further insight into your security posture.<\/p>\n

Methodology<\/strong><\/h2>\n

This analysis looks at the standard text rules and Shared Object rules<\/a> in Snort, both provided by Talos. We compared data sets using Tableau, looking at Snort signatures that only belong to the Connectivity over Security, Balanced, and Security over Connectivity base policies.<\/p>\n

The IPS data we\u2019re using comes from Snort IPS instances included with Cisco Secure Firewall. The data set covers June 1-30, 2023, and the Cisco Vulnerability Management API calls were performed in early July 2023.<\/p>\n

Looking at the total number of alerts will show us which rules alert the most frequently. In-and-of-itself this isn\u2019t a great indicator of severity, as some rules cause more alerts than others. This is also why we\u2019ve looked at the percentage of organizations that see an alert in past analysis<\/a> instead. However, this time we compared the total number of alerts against a list of vulnerabilities that we know are severe thanks to the risk score and other variables. This makes the total number of alerts more meaningful within this context.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1545,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nDetermining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More\u2026 Read more on Cisco Blogs \u200b When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having event data from multiple security applications comes when you can combine two or more sources to uncover new insights about your security posture. For example, let\u2019s take a look at what happens when we take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in IPS telemetry from Cisco Secure Firewall. This is something that you can do yourself if you have these Cisco products. Start by looking up the latest threat intelligence data in Cisco Vulnerability Management, and then gather Snort IPS rule data for vulnerabilities that have alerted on your Secure Firewall. Compare the two and you may be surprised with what you find. Collect the vulnerability threat intelligence It\u2019s very easy to stay on top of a variety of vulnerability trends using the API Reference that is available in Cisco Vulnerability Management Premier tier. For this example, we\u2019ll use a prebuilt API call, available in the API Reference. This API call allows you to set a risk score and choose from a handful of filters that can indicate that a vulnerability is a higher risk: Active Internet Breach\u2014The vulnerability has been used in breach activity in the wild. Easily Exploitable\u2014It is not difficult to successfully exploit the vulnerability. Remote Code Execution\u2014If exploited, the vulnerability allows for arbitrary code to be run on the compromised system from a remote location. To obtain a list of high-risk CVEs, we\u2019ll set the risk score to 100, enable these three filters, and then run a query. With the output list in hand, let\u2019s go see which of these are triggering IPS alerts on our Secure Firewall. Obtaining IPS telemetry from Secure Firewall is easy and there are a several of ways that you can organize and export this data. (Setting up reporting is beyond the scope of this example, \u00a0but is covered in the Cisco Secure Firewall Management Center Administration Guide.) In this case we will look at the total number of alerts seen for rules associated with CVEs. Naturally, if you\u2019re doing this within your own organization, you\u2019ll be looking at alerts seen from firewalls that are part of your network. Our example here will be slightly different in that we\u2019ll look across alerts from organizations that have opted in to share their Secure Firewall telemetry with us. The analysis is similar in either case, but the added bonus with our example is that we\u2019re able to look at a larger swath of activity across the threat landscape. Let\u2019s filter the IPS telemetry by the CVEs pulled from the Cisco Vulnerability Management API. You can do this analysis with whatever data analytics tool you prefer. The result in this case is a top ten list of high-risk CVEs that Secure Firewall has alerted on. CVE Description 1 CVE-2021-44228 Apache Log4j logging remote code execution attempt 2 CVE-2018-11776 Apache Struts OGNL getRuntime.exec static method access attempt 3 CVE-2014-6271 Bash CGI environment variable injection attempt 4 CVE-2022-26134 Atlassian Confluence OGNL expression injection attempt 5 CVE-2022-22965 Java ClassLoader access attempt 6 CVE-2014-0114 Java ClassLoader access attempt 7 CVE-2017-9791 Apache Struts remote code execution attempt (Struts 1 plugin) 8 CVE-2017-5638 Apache Struts remote code execution attempt (Jakarta Multipart parser) 9 CVE-2017-12611 Apache Struts remote code execution attempt (Freemaker tag) 10 CVE-2016-3081 Apache Struts remote code execution attempt (Dynamic Method Invocation) What\u2019s interesting here is that, while this is a list of ten unique CVEs, there are only five unique applications here. In particular, Apache Struts comprises 5 of the top 10. By ensuring that these five applications are fully patched, you cover the top ten most frequently exploited vulnerabilities that have RCEs, are easily exploitable, and are known to be used in active internet breaches. In many ways analysis like this can greatly simplify the process of deciding what to patch. Want to simplify the process even further? Here are a few things to help. Check out the Cisco Vulnerability Management API for descriptions of various API calls and make sample code that you can use, written from your choice of programming languages. Want to run the analysis outlined here? Some basic Python code that includes the API calls, plus a bit of code to save the results, is available here on Github. Information on the CVEs associated with various Snort rules can be found in the Snort Rule Documentation. We hope this example is helpful. This is a fairly basic model, as it\u2019s meant for illustrative purposes, so feel free to tune the model to best suit your needs. And hopefully combining these sources provides you with further insight into your security posture. Methodology This analysis looks at the standard text rules and Shared Object rules in Snort, both provided by Talos. We compared data sets using Tableau, looking at Snort signatures that only belong to the Connectivity over Security, Balanced, and Security over Connectivity base policies. The IPS data we\u2019re using comes from Snort IPS instances included with Cisco Secure Firewall. The data set covers June 1-30, 2023, and the Cisco Vulnerability Management API calls were performed in early July 2023. Looking at the total number of alerts will show us which rules alert the most frequently. In-and-of-itself this isn\u2019t a great indicator of severity, as some rules cause more alerts than others. This is also why we\u2019ve looked at the percentage of organizations that see an alert in past analysis instead. However, this time we compared the total number of alerts against a list of vulnerabilities that we know are severe thanks to the risk score and other variables. This makes the total number of alerts more meaningful within this context. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-01T00:50:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm\",\"datePublished\":\"2023-11-01T00:50:25+00:00\",\"dateModified\":\"2023-11-01T00:50:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\"},\"wordCount\":1141,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\",\"name\":\"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif\",\"datePublished\":\"2023-11-01T00:50:25+00:00\",\"dateModified\":\"2023-11-01T00:50:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm","og_description":"When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More\u2026 Read more on Cisco Blogs \u200b When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having event data from multiple security applications comes when you can combine two or more sources to uncover new insights about your security posture. For example, let\u2019s take a look at what happens when we take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in IPS telemetry from Cisco Secure Firewall. This is something that you can do yourself if you have these Cisco products. Start by looking up the latest threat intelligence data in Cisco Vulnerability Management, and then gather Snort IPS rule data for vulnerabilities that have alerted on your Secure Firewall. Compare the two and you may be surprised with what you find. Collect the vulnerability threat intelligence It\u2019s very easy to stay on top of a variety of vulnerability trends using the API Reference that is available in Cisco Vulnerability Management Premier tier. For this example, we\u2019ll use a prebuilt API call, available in the API Reference. This API call allows you to set a risk score and choose from a handful of filters that can indicate that a vulnerability is a higher risk: Active Internet Breach\u2014The vulnerability has been used in breach activity in the wild. Easily Exploitable\u2014It is not difficult to successfully exploit the vulnerability. Remote Code Execution\u2014If exploited, the vulnerability allows for arbitrary code to be run on the compromised system from a remote location. To obtain a list of high-risk CVEs, we\u2019ll set the risk score to 100, enable these three filters, and then run a query. With the output list in hand, let\u2019s go see which of these are triggering IPS alerts on our Secure Firewall. Obtaining IPS telemetry from Secure Firewall is easy and there are a several of ways that you can organize and export this data. (Setting up reporting is beyond the scope of this example, \u00a0but is covered in the Cisco Secure Firewall Management Center Administration Guide.) In this case we will look at the total number of alerts seen for rules associated with CVEs. Naturally, if you\u2019re doing this within your own organization, you\u2019ll be looking at alerts seen from firewalls that are part of your network. Our example here will be slightly different in that we\u2019ll look across alerts from organizations that have opted in to share their Secure Firewall telemetry with us. The analysis is similar in either case, but the added bonus with our example is that we\u2019re able to look at a larger swath of activity across the threat landscape. Let\u2019s filter the IPS telemetry by the CVEs pulled from the Cisco Vulnerability Management API. You can do this analysis with whatever data analytics tool you prefer. The result in this case is a top ten list of high-risk CVEs that Secure Firewall has alerted on. CVE Description 1 CVE-2021-44228 Apache Log4j logging remote code execution attempt 2 CVE-2018-11776 Apache Struts OGNL getRuntime.exec static method access attempt 3 CVE-2014-6271 Bash CGI environment variable injection attempt 4 CVE-2022-26134 Atlassian Confluence OGNL expression injection attempt 5 CVE-2022-22965 Java ClassLoader access attempt 6 CVE-2014-0114 Java ClassLoader access attempt 7 CVE-2017-9791 Apache Struts remote code execution attempt (Struts 1 plugin) 8 CVE-2017-5638 Apache Struts remote code execution attempt (Jakarta Multipart parser) 9 CVE-2017-12611 Apache Struts remote code execution attempt (Freemaker tag) 10 CVE-2016-3081 Apache Struts remote code execution attempt (Dynamic Method Invocation) What\u2019s interesting here is that, while this is a list of ten unique CVEs, there are only five unique applications here. In particular, Apache Struts comprises 5 of the top 10. By ensuring that these five applications are fully patched, you cover the top ten most frequently exploited vulnerabilities that have RCEs, are easily exploitable, and are known to be used in active internet breaches. In many ways analysis like this can greatly simplify the process of deciding what to patch. Want to simplify the process even further? Here are a few things to help. Check out the Cisco Vulnerability Management API for descriptions of various API calls and make sample code that you can use, written from your choice of programming languages. Want to run the analysis outlined here? Some basic Python code that includes the API calls, plus a bit of code to save the results, is available here on Github. Information on the CVEs associated with various Snort rules can be found in the Snort Rule Documentation. We hope this example is helpful. This is a fairly basic model, as it\u2019s meant for illustrative purposes, so feel free to tune the model to best suit your needs. And hopefully combining these sources provides you with further insight into your security posture. Methodology This analysis looks at the standard text rules and Shared Object rules in Snort, both provided by Talos. We compared data sets using Tableau, looking at Snort signatures that only belong to the Connectivity over Security, Balanced, and Security over Connectivity base policies. The IPS data we\u2019re using comes from Snort IPS instances included with Cisco Secure Firewall. The data set covers June 1-30, 2023, and the Cisco Vulnerability Management API calls were performed in early July 2023. Looking at the total number of alerts will show us which rules alert the most frequently. In-and-of-itself this isn\u2019t a great indicator of severity, as some rules cause more alerts than others. This is also why we\u2019ve looked at the percentage of organizations that see an alert in past analysis instead. However, this time we compared the total number of alerts against a list of vulnerabilities that we know are severe thanks to the risk score and other variables. This makes the total number of alerts more meaningful within this context. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2023-11-01T00:50:25+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm","datePublished":"2023-11-01T00:50:25+00:00","dateModified":"2023-11-01T00:50:25+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/"},"wordCount":1141,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/","name":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif","datePublished":"2023-11-01T00:50:25+00:00","dateModified":"2023-11-01T00:50:25+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16417368-dPjVvs.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/determining-the-10-most-critical-vulnerabilities-on-your-network-ben-nahorney-on-october-31-2023-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Determining the 10 most critical vulnerabilities on your network Ben Nahorney on October 31, 2023 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1544"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1545"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}