How Misconfigurations Outweigh CVEs in Cybersecurity Risks

 

Source: New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs (thehackernews.com)


Research conducted by XM Cyber has uncovered that a whopping 80% of security exposures are due to misconfigurations, while a comparatively minuscule 1% are from Common Vulnerabilities and Exposures (CVEs). Their research, which has studied over 40 million exposures, underlines that more efforts should be directed toward properly configuring systems to reduce cyber risk. 

Focusing solely on CVEs results is a flawed security posture, as misconfigured systems can pose a more substantial risk to critical assets than previously understood. They can create more challenging vulnerabilities, especially since they do not appear on typical vulnerability scans that target software versions rather than configurations. Furthermore, with traditional security measures typically being CVE-focused, the odds of misconfigurations slipping under the radar increase further. 

This research highlights the need to shift the focus, resources, and money from obsessively hunting for CVEs to addressing the elephant in the room through a strategy centered on identifying and correcting misconfigurations. As XM Cyber suggests, organizations can significantly improve their security posture and adopt a more proactive and prudent risk management approach by prioritizing remediation efforts on high-impact exposures and choke points. 

For cybersecurity professionals, this means devoting more time and resources to developing the strategies and tools necessary to drive this shift away from CVE-focused threat hunting. Furthermore, it also necessitates the development of a culture of continuous education and training to ensure that configuration management procedures are instituted and followed on an enterprise level. Ultimately, by addressing misconfigurations, organizations can more efficiently address cyber risk while creating a more robust and resilient cyberspace in which resources are not wasted by excessive targeting of CVEs. 


For a more in-depth overview of the topic, feel free to check out the full report on The Hacker News.

Comments

Popular posts from this blog

Configuring Secure Cloud Networks with VPN and NAT on AWS: A Personal Project

30+ Tesla Cars Compromised Due to TeslaLogger Vulnerability