Vulnerabilities

Web-service unpatched

Risk Level

Hazardous (3)

Platform(s)
  • Non-platform specific

About Web Service Vulnerabilities

Software systems require updates to adapt to the changing technological dynamics, accommodate consumer needs, and most importantly, fix vulnerabilities and bugs. A vulnerability is an exploitable flaw or weakness in a service, whereas a bug is when a service isn’t functioning as it’s designed to function. Both vulnerabilities and bugs can be exploited by cybercriminals to execute various kinds of cyberattacks. 

A web service is an application that’s accessible from outside the network. Web services provide a way to communicate, connect, and use an application over the internet. For example, a web service may allow an external partner to access some data stored in your internal database. 

All software has the potential to have vulnerabilities and bugs, including web services. Software vendors are responsible for discovering and fixing them before they are found and exploited by malicious actors. Software consumers are in turn responsible for immediately applying these fixes, released via updates or patches.

Regardless of how rigorous your security controls are, if you don’t regularly patch your software, you are at serious risk of compromise. This is because cyber criminals like to scan and target networks with known, unpatched vulnerabilities.

Cloud Risk Description

Unpatched services, with known vulnerabilities and bugs, can be one of the main attack vectors into your system. In fact, the majority of attack paths that Orca detects and analyzes begin with an exploitation of a known vulnerability. The stakes are considerably higher if the service is web-facing, that is, accessible from outside the network. Malicious actors can exploit an unpatched vulnerability or bug to cause service downtime, cause a denial of service, or more In some cases, unauthorized remote access may also be a possibility.

How Orca Can Help

Orca creates a full inventory of your cloud environment and leverages 20+ vulnerability data sources to discover and prioritize vulnerabilities across your entire cloud estate. Orca’s workload inventory includes information on OS packages, applications, libraries, web services, as well as versions and other identifying characteristics. Unlike other solutions that simply report on the CVSS score, Orca considers the context of cloud assets, their connections and risks, to understand which vulnerabilities need to be addressed first.

In this specific case, Orca detects an unpatched web service, and will alert on this type of issue as shown in the screenshot above.

Orca

Orca Security, the cloud security innovation leader, provides cloud-wide, workload-deep security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents.