Lucene search

K
avleonovAlexander LeonovAVLEONOV:D7025B9D1F348966AEA736E014AE22F0
HistoryJan 20, 2018 - 10:27 p.m.

Kenna Security: Analyzing Vulnerability Scan data

2018-01-2022:27:03
Alexander Leonov
feedproxy.google.com
817

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

54.7%

Iโ€™ve been following Kenna Security (before 2015 Risk I/O) for a pretty long time. Mainly, because they do the things I do on a daily basis: analyse various vulnerability scan results and feeds, and prioritize detected vulnerabilities for further mitigation. The only difference is that my scripts and reports are highly specific for my employerโ€™s infrastructure and needs. And guys from Kenna team make a standardized scalable cloud solution that should be suitable for everyone.

I think their niche is really great. They do not compete directly with Vulnerability Management vendors. They can be partners with any of them, bringing additional features to the customers. Perfect win-win combination. Thatโ€™s why Kenna speakers regularly participate in joint webinars with VM vendors.

I couldnโ€™t lose a great opportunity to see Kenna Security service in action. ๐Ÿ˜‰

In this post I will try to make a very brief review of Kenna functionality and formulate pros and cons of the solution.

When you submit trial request at <https://www.eu.kennasecurity.com/signup&gt; (or <https://app.kennasecurity.com/signup&gt; if you are not in Europe) you will get a link to your company account:

https://corporation.eu.kennasecurity.com/

The login screen will look like this:

Kenna login

Here you can see all the connectors that can be used to import Vulnerability Scanning and Asset data to Kenna:

Kenna connectors

As you can see it supports all the main Vulnerability Management solutions, as well as AST, ticketing systems and CMDB.

You can use Rest API to upload the data. Here is the interface for generating application keys.

Kenna Application Token

I will not show interface on my real scan data, because it still can be sensitive, even after masking IPs and FQDNs. I made several screenshots from Kenna videos on youtube. Sorry for the quality.

Filters

The most interesting feature of Kenna, in my opinion, is the set of vulnerability filters:

Kenna filters

  • Top Priority - vulnerabilities, that have the highest priority. You can flag them manually as well.
  • Active Internet Breaches - vulnerabilities that attackers actively use at the current time.
  • Easily Exploitable - vulnerabilities with known exploits.
  • Malware Exploitable - vulnerabilities that are actively exploited by different kind of malware (including viruses and ransomware).
  • Popular Targets - vulnerabilities that many Kena customers have.
  • Zero-Day Vulns - vulnerabilities without vendorโ€™s fixes.

If you choose one or several filters you will get different sets of vulnerabilities and assets bellow.

Assets

For each Asset you can see the following fields: Score (Max Vulnerability Score * Asset Priority), Locator (IP or FQDN), OS. Additional fields for Asset: Priority, Last Seen, Tags, Owner, Created.

Kenna assets

If you press on a host name or on a blue arrow, you will get Vulnerability list for the Asset.

Vulnerabilities

The main columns on Vulnerabilities tab: Score (CVSS * 10), Name and Asset. Additional columns: CVE Description, Tags, Scanner IDs, Unique Identifiers, Fix Published, Found, Last Seen, Port, Closed, Due Date, Status, Scanner Score, Service Ticket, Notes, Created.

Kenna vulnerabilities

As you see on the screenshot, there are tags that show the source of vulnerability (Qualys) and characteristics of in the terms the filters that were shown above.

If you press on a blue arrow, you can see vulnerability data: Description, Fix, Known Exploits, and the actual data from detection plugin.

Every vulnerability can be marked as โ€œclosedโ€, โ€œrisk acceptedโ€, โ€œfalse positiveโ€ or โ€œwrong fixโ€.

Kenna Vulnerability Actions

Note, that ALL vulnerabilities presented here as CVE ids. This can be a problem, I will mention it in Pros & Cons.

Fixes

Fixes tab is the most controversial part of the interface. As I understand, they look on the the list of all detected CVEs and try to suggest the fix, that will mitigate maximum of vulnerabilities on maximum of hosts. Several tabs are supported: Diagnosis, Consequence, Solution, CVEs Addressed, Assets Affected, Scanner IDs.

Kenna fixes

The problem is that Fixes are related to CVEs and not the host type. Kenna can show the fix for some specific system, for example โ€œIBM Security AppScan Enterpriseโ€ even if you donโ€™t have such hosts in your environment. Itโ€™s very strange.

Search interface

I want to mention great Search interface that support Elasticsearch-style requests.

Kenna search tips

There are also great GUI filters for groups, assets and vulnerabilities. It will be hard to mention all the parameters that you can use for filtering. Very powerful thing, like Splunk, but highly specialized for Vulnerability data.

Risk Meters

Kenna also has a pretty cool dashboards that you can use to visualize the security state for each asset group.

Kenna Risk Meter

They count Risk level using some secret method. If you press on this indicator you can see the criticality of vulnerabilities in the Asset group. Cute. ๐Ÿ™‚

Kenna hud

Pros & Cons

+ Works out of the box

In my opinion, Kenna is a great solution if you need an instrument for analyzing the current state of security in the organisation. Upload the data, wait couple of minutes and all become visible and searchable. Kenna has a great, very fast highly configurable UI. Itโ€™s a very powerful way to make search requests. And you donโ€™t need to write any scripts for this!

+ Exploit, malware and 0 day feeds

This data is crucial for correct vulnerability prioritization. Malware and 0day data feeds are especially rare. Information about exploits is partly available directly in the scanner (see โ€œExploitability attributes of Nessus plugins: good, bad and Vulnersโ€).

However, itโ€™s not enough to know that exploit for vulnerability exists. Itโ€™s useful to have formalized description: what the exploit can actually do, on what platforms, was this exploit tested in some trusted lab or not. Itโ€™s great if the vulnerability can be exploited from the user interface, like in ERPScan (see โ€œERPScan SAP security scannerโ€). I hope Kenna Team will work in this direction as well.

+ Intuitive API

You can import data in Kenna using great REST API. I am going to make a separate post on this. Upd. Here it is: โ€œKenna Security: Connectors and REST APIโ€

+ Time scale reports

The UI of Kenna looks like you exported your scan data in SIEM. Compare it with post โ€œTracking software versions using Nessus and Splunkโ€. As for me, Iโ€™m a big fun of dynamical reports (read โ€œZeroNights16: Enterprise Vulnerability Managementโ€).

~~ It seems like Kenna doesnโ€™t support them yet. ~~

Upd. Actually they do. I just havenโ€™t found where. My fault =(

Ed Bellis from Kenna added comment about the historical time-series chart. At Dashboards tab you can press on Reporting button and see pretty good dynamical reports for Asset Group.

Kenna reporting

I took this screenshot from official whitepaper โ€œReporting on Risk to the Boardโ€:

Kenna Security Asset Group reports

> โ€ฆSeries charts: Risk Score Over Time, Open Vulnerabilities and Active Assets Over Time, Mean Time to Remediate, Historical Timeline on Top Priority โ€“ Active Internet Breaches โ€“ Easily Exploitable โ€“ Malware Exploitable โ€“ and Popular Targets, Open Vulnerabilities Broken Down by Risk over time, Active Assets Broken Down By Risk over time, and Vulnerabilities by Status over time

In real life it also seems great! So, I think itโ€™s an advantage.

- Plugin to CVE id conversion

This one is **huge!**I donโ€™t like the idea to go from the scanner plugins to CVE. ๐Ÿ™

I understand why they do this - itโ€™s a very natural way to combine scan results from different scanners: Nessus, Qualys, Nexpose, etcโ€ฆ But it also adds ridiculous false positives in vulnerability detection and fix suggestions, it may also lead to the losses of critical vulnerability data.

For example, if Nessus detects on some Linux server โ€œTransport Layer Security (TLS) Protocol CRIME Vulnerabilityโ€, Kenna will make a decision that this server is vulnerable to CVE-2012-4930:

> The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google Chrome, and other products, can perform TLS encryption of compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a โ€œCRIMEโ€ attack.

And will recommend to update web-browser on the server. ๐Ÿ™‚ Because Nessus plugin has a link to this CVE. Pretty funny, isnโ€™t it.

And what will be in a case of some common Nessus plugin โ€œWeb Server Directory Traversal Arbitrary File Accessโ€. Look, it has 22 CVE links to the problems in various software, like HP StorageWorks, HServer, Node.js, QuickShareโ€ฆ Do you really want to see all of this in a vulnerability list for your Asset? ๐Ÿ™‚

Itโ€™s a problem of the CVE data itself: description, classification (see โ€œCWEs in NVD CVE feed: analysis and complaintsโ€), delays (see โ€œForever โ€œreservedโ€ CVEsโ€). Itโ€™s also a problem of mapping Plugin -> CVE id in scanner. Itโ€™s simply not good enough to use it like Kenna does. And what about vulnerabilities without CVEs? There are plenty of them, for example for Apple products.

I donโ€™t know how the Kenna will solve this problem. Maybe they could filter somehow this unrelated CVE ids, maybe they will operate with different vulnerability structures, mapping them on scanner detection plugins directly. In own my scripts I prefer the second option.

Upd. Ed Bellis from Kenna added comment about the fixes:

  1. You can flag the fix as incorrect and the product will learn from this.
    incorrect fix
  2. Kenna can enable a feature flag "use scanner fixesโ€ which will pull the solutions from the scanner._ <- Imho, this should be the most accurate way._

Vulnerabilities also can be marked as false positives:

false positive vulnerability

On the other hand, there simply should not be such vulnerabilities.

- No vulnerability types

There are no vulnerability types: RCE, DoS, XSS, etc. Itโ€™s not clear how the attacker will be exploiting detected vulnerabilities. Simply because there is no such information for CVEs available and you need to get it somehow from the text description. itโ€™s not an easy task.

**upd.**Ed Bellis from Kenna added in comments that they support this. For example, itโ€™s possible to filter RCE:

Kenna filter RCE

Kenna RCE

And it seems like they search for โ€œexecute arbitrary codeโ€ in description of the vulnerability.

Itโ€™s also possible to get great cvss report if you press on HUD button: hud button

Kenna hud

Itโ€™s a screenshot from old version of Kenna. Now they added โ€œHas Known Malwareโ€ widget and removed Asset Priorities widget.

However I will keep this one in cons, because not all vulnerabilities have types, even when the types are clearly readable in description:

Kenna No DoS type

It would be great if solutions like Kenna could model the actions of potential attacker, describe the consequences of such attack in business terms. It certainly requires a deeper understanding which vulnerabilities are practically exploitable and which are not, and maybe even the abilities to demonstrate the attack in a real environment.

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

54.7%