Identify security hotspots in your apps and STOP hackers from exploiting you
The story behind Equifax: one of their most exposed web application was using an unpatched version of Apache Struts 2. This lead to a critical security breach which was exploited by hackers who didn’t even need to be authenticated and stole millions of Equifax’s customer data. The breach made headlines and caused a myriad of issues for both Equifax and Apache. The most important lesson learned is we need to be more proactive and know our vulnerabilities before it’s too late. This article explains how CAST Highlight can help you detect and mitigate vulnerabilities before hackers find them, thanks to 2 important features: automated framework discovery feature and continuous CVE database lookup.
What is a CVE?
A CVE (Common Vulnerabilities & Enumerations) is “a weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability. Mitigation of the vulnerabilities in this context typically involves coding changes, but could also include specification changes or even specification deprecations (e.g., removal of affected protocols or functionality in their entirety)” (source: NIST).
In other words, a CVE is a known/documented issue or flaw in a specific version of a software component. Whether it is commercial or open source, your application is at risk from a security standpoint if it’s in your production environment.
Launched by the National Institute of Standards and Technology (NIST) and regularly updated by the MITRE, the National Vulnerability Database references around 100K vulnerabilities distributed across 2300 software products. Some of them are very famous like Linux Kernel with the highest number of vulnerabilities. Android with the highest number of CVEs found in 2017, others are less known by a larger audience but maybe used somewhere in your applications. For instance, Yassl had issues, it was embedded into some versions of the well-known MySQL database and exposed software to DoS attacks.
The amazing thing about this CVE database is that the information is structured the same way across all entries and allows us to categorize the vulnerabilities:
- A unique CVE Idendifier and status – E.g. CVE-2017-5638
- Product and Vendor – E.g. Apache / Struts
- Version(s) where the issue is found – E.g. 2.3.5.*, 2.5.3.*
- The kind of issue (mapping with CWE classification) – E.g. CWE-20 (Input Validation)
- a CIA (confidentiality, integrity, availability) impact categorization – E.g. C:High, I:High, A:High
- a characterization of what is needed to exploit the vulnerability – Eg: Attack Vector (Network), Complexity (Low), Privileges (None), User Interaction (None)
- References to advisories, solutions and tools: E.g. Mitigation provided by Apache
- The organization having referenced the CVE (e.g. US-CERT/NIST), date, last revision, etc.
- A global score that helps InfoSec and development teams prioritize actions (e.g. 10 out of 10 / CRITICAL)
CVE detection and reporting in CAST Highlight



How to use the feature: Put InfoSec insights and CVEs into your app portfolio context
Would you personally take the decision to upgrade (and re-test) an application which can be used only in your walls and without any sensitive data in it? InfoSec ayatollahs are not going to be pleased but the organization should be able to rationalize their security effort.
Security is a speed race!
Securing and protecting your software against hackers is a speed race and the only way you will avoid a malicious attack is to be aware of the possible breach at the earliest. That’s exactly where the planets align perfectly with the other features of CAST Highlight. In order to ensure your application is not exposed too long (or ideally not at all) to vulnerabilities, you need to frequently control your software at the first stages in the build chain – even before it’s shipped in production.