The Issue
Software artifacts typically have a very high number of CVEs, in some cases, security reviews have found over 1K CVEs, but handling all of these CVEs is practically impossible. Usually, the common way of deciding which CVEs to resolve is based on CVSS scoring, as well as published technical information on the relevant security advisories. This can be very challenging and an insufficient method for understanding the actual risk raised by a vulnerability for the following reasons:
For example, take a CVE that is a very severe, easily-exploitable, remote code execution vulnerability (RCE) in a library lib. It will probably have a very high CVSS score, but there is only a rare scenario that allows remote access. It can be a vulnerability in a function that is not used in the real-world, or rare conditions that should be met, like using the vulnerable library lib in a “debug” mode for example.
In addition, the published technical information of CVEs in security advisories, is sometimes very limited. It would be very hard to understand these specific conditions that need to be met for the CVE to be applicable, as well as fixing solutions, which are not necessarily a software upgrade, but also code patches or any deployment or code mitigations.
The Solution
This is where JFrog Security CVE Research and Enrichment comes into play. JFrog security research and threat intelligence teams continuously review and analyze CVEs, existing and new ones, to determine if they are likely to be exploited by real-world attackers. Based on the analysis, the research team set a JFrog Research Severity score for CVEs, and provides detailed technical information on the specific conditions for the CVE to be applicable, as well as detailed fixing and mitigation options.
CVEs analyzed by the JFrog security research team are determined by the following criteria:
After the deep analysis, CVEs are enriched with the following research information:
What should you do with JFrog research enriched CVEs?
CVEs with the highest JFrog security severity are the most likely to be used by real-world attackers. This means that you should put effort into fixing them as soon as possible. After fixing those CVEs, the risk of the software artifact being exploited by a CVE becomes much lower.
To help you fix the issues, the JFrog security team provides you with detailed fix and mitigation options for the CVEs. In some cases, there are easier and harder ways to fix an issue.
For example, it may be possible to fix a CVE in the Linux kernel in several ways:
By providing all the different mitigation options, Xray empowers you to make smart choices when creating the mitigation plan and choosing the paths with the highest return on investment.
CVEs with low JFrog security severity are considered less risky, as it would be very unlikely to exploit them in the real world, or the impact of the exploitation is low.You can access the CVE data in the Xray Data tab in Artifactory and in the Watch Violations page under Security and Compliance.
Artifactory:
Watch Violations:
JFrog research enriched CVEs are indicated by an icon in the list.
Once you click on the CVE, the CVE details are displayed in the right panel. The JFrog research enriched CVE will include the following additional details:
The severity given by the JFrog security research team after the manual analysis by the team.
Displays fixed versions for the issue if any, or recommendations such as upgrading and mitigations.
A summary of the issue in the CVE based on JFrog's security analysis .
A detailed description of the issue that provides more insights on the vulnerability, based on JFrog's security analysis.
The reasons behind the JFrog research severity.
The following REST APIs support the CVE Research and Enrichment feature.
The following parameters were added: