3 Benefits of a 360-Degree Vulnerability Assessment
Defending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
The usefulness of CVSS (Common Vulnerability Scoring System) is widely debated across the Operational Technology (OT) community because of its weaknesses in assuming detailed knowledge, environmental security requirements, depth of impact, inability to update over time, and focus on single vulnerabilities, as opposed to the effects vulnerabilities have on each other.
While the industrial industry relies on decades of progressive technology, it also has a stringent focus on Safety-Productivity-Reliability and financial feasibility. So, where does CVSS fit in, and how can we make it work for cyber security in a field dominated by OT?
A stronger standard metric for scoring vulnerabilities does not exist. Whether you feel a CVSS score is useful or useless, it should be supplemented with additional techniques and mechanisms to improve the application of a score by security teams. Let’s take a look at the advantages and disadvantages of CVSS scores and CVEs when managing both IT and OT systems.
CVSS downfalls are largely related to the differences in environments and how they are operated, engineered, and staffed. For example, to update a virtualized and distributed server in IT, a brief outage is scheduled and applied to the OEM patch during non-operational hours with a reasonable amount of caution.
In OT environments, physical servers require waiting until a scheduled downtime or site maintenance window to test and apply patches with a rigorous level of caution, if the patch is feasible at all. If an OT environment has strict compliance and regulatory needs, patches may need to be applied within a specific window of time, If a patch is applied, the environment may need to be re-certified, costing hundreds of thousands of dollars or a disruption that affects the site’s SRP.
A software fix or patch for a vulnerability reported as a CVE becomes operationally challenging unless using a solution appropriate to OT environments. But don’t forget, many devices and pieces of software have vulnerabilities, but they are undisclosed because they are unknown (zero-days) or neglected.
CVSS scores do not account for the age of a vulnerability, nor its usage in a chain of exploits. A CVSS score is not concrete over time.
Patching concerns used to be dictated by the vendor and their ability to approve the fix. Today, solutions exist and work in many critical environments, largely solving the technical hurdle of patching OT hosts. However, if vulnerabilities are reported constantly, how do we categorize, triage, and prioritize vulnerability management campaigns?
Let’s start with an example of a recent vulnerability from ICS CERT:
Several vulnerabilities are grouped together for this advisory, and it contains a CVSS 3.0 score of 9.8, which is very high and trivial to exploit remotely. Several mediations are offered, and there is insight into which systems were affected.
A CISO in an IT organization, constantly combatting malware threats, phishing, and cloud/Internet-facing systems, would likely be worried and in need of a hastened response. But a site owner in an OT organization would question:
The last point is the most important and most common to resonate with asset owners. Patch where you can, especially on commodity systems, and do so with relative ease. After all, most attacks come through applications and commodity Operating Systems.
The key question site owners should consider when managing the flood of vulnerabilities is the application of the vulnerability, the criticality of the host system, and the host system’s risk exposure.
We’ve shared resources on balanced risk exposure and quantifying risk in OT when numbers are scarce, but the next thing to calculate is the score of a vulnerability when prioritizing which vulnerabilities to patch.
You may calculate vulnerability scoring with a formula such as:
F(x) = (CVSS score) * (criticality of an asset to the org/process) * (potential impact to the org) * (exposure to potential exploitation) * (compensating controls)
Using the resulting score, assuming it is not zero, (you should not use a minimum value of zero as no risk will ever fully disappear) map it to pre-defined criteria, matching ranges to a label. (E.g., 0-3 is low, 4-5 medium, 6-7 high, 8-10 critical).
This may come across as an academic exercise, but this vulnerability scoring formula provides a foundational premise to build lists of assets classified by criticality. It also creates lists of patches to apply to hosts as part of a campaign or to determine mitigation measures for implementation.
No common vulnerability scoring system will ever be perfect, but this is where additional advanced formulas, combined with tribal knowledge of the organization, become valuable. This is a good start to making CVSS scores work in OT as part of your vulnerability management program.
Asset owners should work with their teams to arrive at realistic CVSS scores that are consumed and prioritized when using a scoring framework augmented by a well-described algorithm. It is repeatable when parameterized correctly and appropriately tailored to your organization.
There is an upcoming opportunity to programmatically implement elements of this formula as part of a technology-assisted vulnerability management component for your cyber security program. Reach out to us learn more about making CVSS scoring less complicated and less work for your teams.
Defending critical infrastructure requires 360-degree visibility into asset and network vulnerabilities through a vulnerability assessment.
Learn MoreHow does patch management fit into broader ICS risk management in OT cyber security, and how does it compare to standard IT patching processes?
Learn MoreWhat ten years of vulnerability assessments can teach the OT/ICS cyber security industry about vulnerability exposure and risk prioritization and remediation.
Learn More