blog

Enhancing Cybersecurity with CWE and CISA KEV: A Strategic Approach to Application Security Posture Management (ASPM)

CWE = CISA KEV top analysis

New research by the CWE group of Mitre on CISA Kev and common vulnerabilities Application security and vulnerability management programs can leverage that information to enhance the detection of patterns; ASPM technology is especially helpful in this space as they cross-correlate Application and deployment environments. This correlation is critical as CISA KEV vulnerabilities mostly affect infrastructure and hardware type of assets (see article application security and KEV

CWE: A Foundation for Application Security:

Common Weakness Enumeration is a standardised list of common software and hardware weaknesses. It’s an invaluable tool in Application Security, offering a universal language for understanding and discussing software vulnerabilities. They categorise each vulnerability, aiding developers and security professionals identify potential application flaws. This proactive approach is essential for a robust Application Security Posture Management strategy, ensuring that applications are fortified against known vulnerabilities from the development phase. Understanding weaknesses and their categories can help teams leverage better ASPM technologies and craft tailored training for developers and engineers.

CISA KEV: Prioritizing Threats in Cybersecurity:

application security, cwe, weakness, cisa kev, vulnerability management

THE CISA KEV catalogue is a resource highlighting vulnerabilities that are actively exploited and can help detect patterns in vulnerability management and application. It is a real-time guide for cybersecurity teams to prioritise threats that pose an immediate risk. By focusing on these vulnerabilities, organisations can optimise their resources and efforts in addressing the most critical and impactful threats first, enhancing their overall Vulnerability Management process.

The analysis has highlighted Memory Safety, Improper Input Validation and injection as the top 3 typical vulnerability types.

While from a deeper analysis in 2023 alone, the top trending categories are:

  • CWE-79 (Cross-site Scripting): A high score and rank indicate its prevalence and impact.
  • CWE-89 (SQL Injection): Another high scorer, highlighting its continued relevance.
  • CWE-20 (Improper Input Validation): Common and critical, affecting various applications. 

Methodology of Attack and Systemic Issue Identification:

Both those two datasets follow methodologies that help identify systemic issues in cybersecurity; this is one of the top techniques used by ASPM technologies to cross-correlate different types of technologies

  • Categorisation and Severity Assessment: CWE categorises vulnerabilities, while CISA KEV highlights their exploitability. This combined information provides a comprehensive view of potential attack vectors, enabling organisations to assess the severity and impact of each vulnerability.
  • Trend Analysis and Predictive Insights: Analyzing the trends of both datasets can offer predictive insights into potential future threats. This foresight is crucial for proactive Application Security and Vulnerability Management.
  • Resource Optimization: By understanding the most prevalent and severe vulnerabilities, organisations can allocate their resources more effectively, focusing on the areas needing the most attention to mitigate risks.

The CWE in CISA KEV data analysis

The dataset analysed seems to be slightly antiquated and dates around May. Moreover, several (164) vulnerabilities were unclassified over the two years analysed. ASPM Technologies heavily leverages Weakness to understand patterns of vulnerabilities. Refer to the CWE CISA KEV data explorer for more and detailed insights

Overlaying exploitability analysis of the exploits verified in Nuclei and Metasploit modules shows a significant presence of verified exploitable vulnerabilities in Kev as one of the requirements to be in CISA KEV.

Analysing 2022 and 2023, where CISA KEV has the richest dataset and is more mature, we can see a pattern of vulnerability.

Interestingly, not all the CWE top 25 appear in CISA KEV, highlighting the bias of KEV towards a certain set of vulnerability types (infrastructure, IoT, Hardware) 

CISA KEV CWE Analysis
  • Prominent CWE Types, based on the Top25 Rank and Score, are:
    • CWE-79 (Cross-site Scripting): A high score and rank indicate its prevalence and impact.
    • CWE-89 (SQL Injection): Another high scorer, highlighting its continued relevance.
    • CWE-20 (Improper Input Validation): Common and critical, affecting various applications.
    • CWE-119 and CWE-787: Related to memory safety, indicating ongoing issues in software memory management.
  • Severity and Exploitability:
    • Highest Severity: Several CWEs, like CWE-78, CWE-416, and CWE-94, have vulnerabilities rated at the highest severity (10), indicating potential for significant impact.
    • Exploit Verified and PoC/ExploitDB: CWEs like CWE-20, CWE-416, and CWE-502 have verified exploits or PoC available, suggesting they are actively or at high risk of exploitation.
  • Vulnerability Spread:
    • A number of Vulnerabilities and Products: CWE-78, CWE-416, and CWE-94 show more vulnerabilities and affected products, indicating widespread issues.
    • Number of Vendors: A high number of vendors affected by certain CWEs like CWE-20 and CWE-787 suggests industry-wide challenges.
  • EPSS (Exploit Prediction Scoring System):
    • High EPSS scores in CWEs like CWE-79, CWE-502, and CWE-284 imply a higher likelihood of these vulnerabilities being exploited in the wild.
  • Temporal Aspects:
    • Average Time to KEV: This metric varies significantly across CWEs, with CWE-78 and CWE-200 having a notably longer average time, suggesting slower detection or reporting.
  • Popularity Data and Bug Bounty: Popularity data and the presence of bug bounties, as seen in CWEs like CWE-269 and CWE-502, can indicate community and industry focus on these vulnerabilities

When Taken into consideration, classified Vulnerabilities dwarf the other datasets (see rightmost bars) 

CISA KEV, Application Security, CWE, Appsec, vulnerability management

The top vulnerabilities across 2022 and 2023 remain confirmed by the overall analysis (going back to 2020), with CWE 20, 119, and 787 having the biggest presence.

There is a general decrease in the number of reported vulnerabilities from 2022 to 2023 for many CWE types, such as CWE-20 (Improper Input Validation) and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This could indicate improved security practices or a shift in the types of discovered vulnerabilities.

CISA KEV, Application Security, CWE, Appsec

Complexity of CWE – Nesting

So why the two pies are different? Because the CWE have a nested structure an example of the mapping will lead to a better understanding of the methodologies of attacks

CWEDescriptionCategory
NVD-CWE-noinfoUnknown CWENot Applicable
CWE-20Improper Input ValidationSoftware and Data Integrity Failures
CWE-119Improper Restriction of Operations within the Bounds of a Memory BufferMemory Buffer Errors
CWE-787Out-of-bounds WriteMemory Buffer Errors
CWE-78Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)Injection
CWE-416Use After FreeResource Management Errors
CWE-22Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)Pathname Traversal and Equivalence Errors
CWE-94Improper Control of Generation of Code (‘Code Injection’)Injection
Example of mapping CWE to categories
cwe, vulnerability management, aspm

This overview summarizes and highlights different trends between years

  • Software and Data Integrity Failures: With a notable decrease from 48 in 2022 to 4 in 2023, this category suggests a significant improvement in software and data integrity practices, potentially indicating more robust coding practices or effective vulnerability remediation.
  • Memory Buffer Errors: Remaining a prevalent issue, memory buffer errors show a slight decrease. This type of error remains consistently high, indicating the continuing challenge of managing memory safely in software development.
  • Injection: The substantial rise from 62 to 23 suggests an increasing trend in exploitation techniques like SQL, Command, and Cross-Site Scripting (XSS) attacks, which remain the favourite vectors for attackers.
  • Resource Management Errors: With a minor increase, these errors, which often lead to leaks or exhaustion of system resources, indicate a persistent challenge in handling system resources correctly.
  • Pathname Traversal and Equivalence Errors: The minimal change from 29 to 2 suggests that while these issues are less frequent, they remain a consistent threat, often leading to unauthorized file access.
  • Permissions, Privileges, and Access Controls: With an almost unchanged count, issues in this category remain a constant threat, emphasizing the need for strict access control measures.
  • Serialization Issues: The increase from 9 to 6 could reflect a rise in the complexity of applications and the utilization of serialization/deserialization processes, leading to more vulnerabilities being identified.
application security, cwe, weakness, vulnerability management, aspm
  • Type Confusion: A slight increase in type confusion errors points to ongoing issues with type safety in programming languages, which can lead to severe security implications.
  • Authentication Errors: Doubling in count from 2022, these errors suggest that improper authentication mechanisms continue to be a significant vector for security breaches.
  • Information Exposure: The small increase indicates a continued risk of sensitive information being exposed due to various vulnerabilities.
  • File and Directory Management: With no change year over year, this suggests a steady state of challenges associated with file and directory management vulnerabilities.
  • Cross-site Scripting: The rise in XSS issues points to the persistent relevance of client-side security and the need for web applications to better sanitize user input.
  • SQL Injection: A slight increase from 2022 to 2023 in SQL injection attacks underlines their continued use by attackers to exploit databases.
  • Authorization: Doubling in frequency, authorization issues are increasingly exploited, potentially allowing attackers unauthorized access to system functions.
  • Access Control Errors: A slight increase in access control errors highlights ongoing challenges in ensuring proper restrictions on system access.
  • Concurrency Issues: A small increase in concurrency issues underscores the complexities of multi-threaded and concurrent processing in secure applications.
  • Numeric Errors: A slight increase in numeric errors, such as integer overflows, suggests that fundamental programming pitfalls continue to be a source of vulnerabilities.
  • Not Applicable: The significant number of unclassified or ‘Not Applicable’ entries, especially increasing in 2023, may indicate a set of vulnerabilities that are yet to be categorized or are outside the scope of existing classifications, reflecting either emerging threats or a lag in vulnerability identification and categorization.

Optimising ASPM with CWE and CISA KEV:

Integrating CWE and CISA KEV into Application Security Posture Management enables organisations to build a more resilient cybersecurity framework. This integration helps in:

  • Early Detection and Prevention: Identifying vulnerabilities early in the software development lifecycle through CWE can prevent the exploitation of these weaknesses.
  • Prioritisation of Patching and Updates: Utilizing CISA KEV, organisations can prioritise patching the most critical vulnerabilities first, an essential aspect of effective Vulnerability Management. Leveraging the detection of CWE enables the identification of patterns for vulnerabilities.
  • Comprehensive Security Strategy: Combining the insights from both CWE and CISA KEV allows for a more comprehensive and informed security strategy, addressing both potential and active threats.

Conclusion:

The synergy between CWE and CISA KEV is indispensable for a robust Application Security Posture Management strategy. By leveraging these resources, organizations can enhance their understanding of vulnerabilities, prioritize their response to threats, and optimize their overall cybersecurity framework. In the dynamic landscape of Application Security and Vulnerability Management, staying informed and proactive is key to safeguarding against evolving cyber threats.

How Can Phoenix Security Help with CWE and prioritization

attack graph phoenix security
ASPM

Phoenix Security helps organisations identify and trace which systems have vulnerabilities, understanding the relation between code and the cloud. One of the significant challenges in securing applications is knowing where and how frameworks like Struts are used. ASPM tools like Phoenix can cross-correlate CISA KEV and provide early notification when an asset or a vulnerability is subject to ransomware or the break of a federal government contract.

The CISA KEV and CWE analysis provided by Phoenix can help organisations better train the developers and engineers and identify issues and patterns. 

This information is crucial for targeted security measures and efficient patch management. Phoenix Security’s robust Application Security Posture Management (ASPM) system is adept at managing and preempting the exploitation of vulnerabilities through its automated identification system. This system prioritises critical vulnerabilities, ensuring teams can address the most pressing threats first, optimising resource allocation and remediation efforts.

application security, cwe, weakness, cisa kev

The Role of Application Security Posture Management (ASPM):

ASPM is vital in managing and securing applications like those built with Apache Struts. It involves continuous assessment, monitoring, and improvement of the security posture of applications. ASPM tools can:

  1. Identify and Track Assets and CWE: Locate where Struts is implemented within the application infrastructure.
  2. Vulnerability Management: Detect known vulnerabilities in Struts and prioritize them for remediation.
  3. Configuration Monitoring: Ensure Struts configurations adhere to best security practices.
  4. Compliance: Check if the usage of Struts aligns with relevant cybersecurity regulations and standards.

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get an overview of your asset lineage

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Explore the interplay between the MITRE ATT&CK framework and EPSS for effective vulnerability management. Learn how these tools help predict and prioritize cyber threats, with deep dives into the most and least exploited techniques. Stay ahead in cybersecurity with Phoenix’s advanced analysis.
Francesco Cipollone

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.