Your SlideShare is downloading. ×
Insecurity in security products v1.5
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Insecurity in security products v1.5


Published on

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • Should be “Cloud-based”, not “On Demand”
  • Transcript

    • 1. (In)Security in Security ProductsWho do you turn to when your security product becomes agateway for attackers? 1
    • 2. About the report• Security Products are present in most of the systems and theoretically can become a “high pay-off” target for hackers after the OS, Browsers etc.• At iViZ we wanted to study how secure are the security products• iViZ used databases such as the Common Vulnerability Enumeration (CVE), Common Product Enumeration (CPE) and Nation Vulnerability Database (NVD) for the Analysis 2
    • 3. How are security vendors doing in terms of protecting their own products? According to our “(In)Security in Security Products” report,• More recently, hackers have claimed to be in possession of the source code for Symantecs PC anywhere tool and Norton antivirus. 3
    • 4. Vulnerabilities in Security Products• Man in the Middle (MITM) vulnerability in Symantec Backup Exec 12.1• Remote Code Execution via buffer overflows vulnerability in Symantec Veritas Enterprise Administrator products• Encryption bypass of major disk encryption software’s including Microsoft Bit locker, True Crypt and MacAfee Safe Boot Device• Remote code execution vulnerabilities in various anti-virus products including AVG, F-Secure, Sophos and ClaimAV etc For Details: 4
    • 5. 6
    • 6. 7
    • 7. 8
    • 8. Vulnerabilities by Security Companies Vulnerabilities by Vendors ClamAVKaspersky Lab Cisco Trend Micro Symantec McAfee ISS Checkpoint CA 0 200 400 600 800 1000 1200 9
    • 9. Vulnerabilities in Security Products Vulnerabilities in Security Products F-Secure Anti-virus Cisco PIX Firewall Figure 6: Shows number of Sophos Anti-virus vulnerabilities found in Cisco Adaptivesecurity Appliance some of the major security products existing today. X Kaspersky Anti-virus axis display number of vulnerabilities and Y axis ClamAV Anti-virus display some of the major security products. Total Trend Micro Officescan vulnerabilities against each AVG AntiVirus security product are calculated by considering Norton Personal Firewall all the versions of the products and their Norton AntriVirus individual vulnerabilities Checkpoint Firewall-1 discovered over the past years.Symentec Norton Internet Security McAfee Anti Virus 0 10 20 30 40 50 60 70 80 10
    • 10. 11
    • 11. ConclusionThe two largest threats to security product vendors/developers are :-• The Black 0-Day Market• Cyber Warfare Vulnerabilities are as common in security products as they are in non – security products. As per the Global Risk 2012 report, the cost of each cyber crime is 5.9 million USD and likely to grow. There is no foolproof solution to mitigate Cyber Warfare Attacks, but we can take suitable measures to ensure security is itself more secure in the future. 12
    • 12. Some thoughts..• Security companies do not necessarily produce secure software• Security products can itself serve as a door for a hacker• Security Products are “High Pay-off” targets since they are present in most systems• APT and Cyber-warfare makes “Security Products” as the next choice 13
    • 13. • Are you sure if your web-application is Secure?• Check out our Cloud based Penetration Testing solution with “Zero False Positive Guarantee” : Bikash Barai CEO, Co – founder of iViZ Blog: Linkedin: Twitter: Thank you 14