When is One Vulnerability Scanner Not Enough?

0

Like antivirus software, vulnerability scans rely on a database of known weaknesses.

That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasn’t existed in the vulnerability management space.

Generally speaking, vulnerability scanners aim to produce checks for as many vulnerabilities as possible. However, the number of vulnerabilities discovered year on year is now so high, reaching nearly 30,000 a year, or 80 a day, that it’s impossible for a single scanning engine to keep up with them all.

As a result, even the very best, industry-leading leading scanners will struggle to check for every known vulnerability out there, and often they will favour certain sets of software known to be used by their customers.

For example, Intruder’s analysis from early 2023 which compared Tenable’s Nessus and OpenVAS showed significant differences in coverage between scanners, with one being generally stronger in commercial software, and the other favouring open source:

“Tenable checks for 12,015 CVEs which OpenVAS does not check for and OpenVAS checks for 6,749 CVEs which Tenable does not check for.”

Scanning engine vendors also take other factors into consideration, like whether a vulnerability has been exploited in the wild, or whether it’s in software products which are very widely used. But even though your chosen scanner may be making sensible decisions on which vulnerabilities to write checks for there may still be gaps in coverage for your estate.

So it’s a harsh reality that one day you may find out that you’ve been compromised via an attack vector which your vulnerability scanner simply doesn’t have a check for.

This raises significant questions for those looking to protect their digital estates, not only which scanner they should choose. But whether one scanner is even enough?

It’s clear that having several complementary scanners would improve coverage by finding more vulnerabilities, and discovering more about what your attack surface looks like. But operating multiple scanning systems would be too much for most organisations to afford, both in budget and time constraints.

That’s why the team at Intruder, a leading Attack Surface Management vendor, decided from the start to incorporate multiple scanning engines, offering customers the widest breadth of checks, while streamlining budget and time constraints by providing them in a single platform.

Most recently, Intruder has added Nuclei to its suite of vulnerability scanning engines, enhancing its ability to manage and secure attack surfaces.

With over 3,000 additional checks in this initial release, Intruder can offer much broader and deeper coverage and discovery capabilities that can’t be matched by using a single vulnerability scanner alone.

Nuclei is an open-source vulnerability scanning engine, similar to OpenVAS, which is fast, extensible, and covers a wide range of weaknesses. It’s become increasingly popular with bug bounty hunters, penetration testers and researchers who want to produce repeatable checks for serious weaknesses.

These experts, working with the Nuclei development team at ProjectDiscovery, combine their knowledge and insights about cutting-edge weaknesses to produce checks extremely fast – which makes scanning as soon as possible after a vulnerability is discovered.

What does Nuclei add to Intruder?

By integrating Nuclei as a scanning engine, Intruder further enhances its vulnerability management platform capabilities to check and secure attack surfaces more effectively.

This includes expanded detection of exposures like login panels that should not be exposed to the internet, and increasing the range of checks for known vulnerabilities in commonly exposed services.

Nuclei augments Intruder’s existing scanning engines, such as Tenable and OpenVAS, by providing a deeper and broader view of your attack surface, thus enabling better protection by uncovering risks that would remain undetected by a single scanning engine.

The size of your attack surface, and how well it’s managed, is closely tied to your risk of opportunistic attackers exploiting your systems. The less you expose, and the more hardened the services you expose are, the harder it is for an attacker to exploit a weakness.

You can reduce your attack surface by continuously monitoring for changes with an automated vulnerability management tool like Intruder.

Intruder’s platform allows you to:

LEAVE A REPLY

Please enter your comment!
Please enter your name here