SlideShare a Scribd company logo
(In)Security in Security Products
Who do you turn to when your security product becomes a
gateway for attackers?




                                                          1
About the report


• Security Products are present in most of the systems and theoretically can
  become a “high pay-off” target for hackers after the OS, Browsers etc.

• At iViZ we wanted to study how secure are the security products

• iViZ used databases such as the Common Vulnerability Enumeration (CVE),
  Common Product Enumeration (CPE) and Nation Vulnerability Database
  (NVD) for the Analysis




                           www.ivizsecurity.com                                2
How are security vendors doing in terms of
           protecting their own products?



   According to our “(In)Security in Security Products” report,



• More recently, hackers have claimed to be in possession of the source
  code for Symantec's PC anywhere tool and Norton antivirus.




                           www.ivizsecurity.com                           3
Vulnerabilities in Security Products

• Man in the Middle (MITM) vulnerability in Symantec Backup Exec 12.1

• Remote Code Execution via buffer overflows vulnerability in Symantec
  Veritas Enterprise Administrator products

• Encryption bypass of major disk encryption software’s including Microsoft
  Bit locker, True Crypt and MacAfee Safe Boot Device

• Remote code execution vulnerabilities in various anti-virus products
  including AVG, F-Secure, Sophos and ClaimAV etc

  For Details: http://www.ivizsecurity.com/security-advisory1.html



                          www.ivizsecurity.com                                4
6
7
8
Vulnerabilities by Security Companies

                                 Vulnerabilities by Vendors

     ClamAV


Kaspersky Lab


        Cisco


 Trend Micro


   Symantec


     McAfee


          ISS


  Checkpoint


          CA


                0       200     400               600         800   1000   1200




                               www.ivizsecurity.com                               9
Vulnerabilities in Security Products

                                Vulnerabilities in Security Products

               F-Secure Anti-virus

                Cisco PIX Firewall
                                                                                           Figure 6: Shows number of
                Sophos Anti-virus
                                                                                           vulnerabilities found in
 Cisco Adaptivesecurity Appliance                                                          some of the major security
                                                                                           products existing today. X
              Kaspersky Anti-virus                                                         axis display number of
                                                                                           vulnerabilities and Y axis
                ClamAV Anti-virus                                                          display some of the major
                                                                                           security products. Total
           Trend Micro Officescan
                                                                                           vulnerabilities against each
                    AVG AntiVirus                                                          security product are
                                                                                           calculated by considering
         Norton Personal Firewall                                                          all the versions of the
                                                                                           products and their
                Norton AntriVirus                                                          individual vulnerabilities
            Checkpoint Firewall-1
                                                                                           discovered over the past
                                                                                           years.
Symentec Norton Internet Security

                McAfee Anti Virus

                                     0   10      20     30      40     50   60   70   80



                                                  www.ivizsecurity.com                                                    10
11
Conclusion



The two largest threats to security product vendors/developers are :-

• The Black 0-Day Market
• Cyber Warfare

   Vulnerabilities are as common in security products as they are in non –
   security products. As per the Global Risk 2012 report, the cost of each
   cyber crime is 5.9 million USD and likely to grow. There is no foolproof
   solution to mitigate Cyber Warfare Attacks, but we can take suitable
   measures to ensure security is itself more secure in the future.




                            www.ivizsecurity.com                              12
Some thoughts..



• Security companies do not necessarily produce secure software

• Security products can itself serve as a door for a hacker

• Security Products are “High Pay-off” targets since they are present in most
  systems

• APT and Cyber-warfare makes “Security Products” as the next choice




                           www.ivizsecurity.com                                 13
• Are you sure if your web-application is Secure?

• Check out our Cloud based Penetration Testing solution with “Zero False
  Positive Guarantee” : www.ivizsecurity.com




    Bikash Barai
    CEO, Co – founder of iViZ
    Blog:     http://bikashbarai.blogspot.in
    Linkedin: http://www.linkedin.com/pub/bikash-barai/0/7a4/669
    Twitter: https://twitter.com/bikashbarai1



                                     Thank you
                                                                            14

More Related Content

PDF
iViZ Profile
PPTX
Kaspersky security for virtualization light agent launch presentation
PPTX
Introducing Kaspersky Security for Virtualization - Light Agent
PPTX
Vulnerability in Security Products
PPTX
Introducing Kaspersky Security for Virtualization
PDF
Symantec Virtualization Launch VMworld 2012
PPTX
Symantec Advances Enterprise Mobility Strategy
PPT
Why current security solutions fail
iViZ Profile
Kaspersky security for virtualization light agent launch presentation
Introducing Kaspersky Security for Virtualization - Light Agent
Vulnerability in Security Products
Introducing Kaspersky Security for Virtualization
Symantec Virtualization Launch VMworld 2012
Symantec Advances Enterprise Mobility Strategy
Why current security solutions fail

What's hot (19)

PDF
Trend micro deep security
PPTX
Sophos utm-roadshow-south africa-2012
PDF
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
PDF
RSA 2012 Virtualization Security February 2012
PPTX
Trend micro v2
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PDF
Symantec Ubiquity
PPT
I Vi Z Profile
PPTX
Security Matters : The Evolution of Samsung KNOX™
PPTX
Data Centre Evolution: Securing Your Journey to the Cloud
PPTX
Sandbox
PDF
Kaspersky Security For Virtualization - ENGLISH
PDF
Kaspersky Endpoint Security and Control - ENGLISH
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PDF
Mobile Banking Channel Security - Cyber Security Conference 2011
PDF
Samsung KNOX: The Game Changer for Enterprise Mobility
PPTX
Watchguard security proposal 2012
PPTX
Symantec Web Security Solutions
PDF
Avast product brochure
Trend micro deep security
Sophos utm-roadshow-south africa-2012
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
RSA 2012 Virtualization Security February 2012
Trend micro v2
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Symantec Ubiquity
I Vi Z Profile
Security Matters : The Evolution of Samsung KNOX™
Data Centre Evolution: Securing Your Journey to the Cloud
Sandbox
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Introduction to Kaspersky Endpoint Security for Businesss
Mobile Banking Channel Security - Cyber Security Conference 2011
Samsung KNOX: The Game Changer for Enterprise Mobility
Watchguard security proposal 2012
Symantec Web Security Solutions
Avast product brochure
Ad

Similar to Insecurity in security products v1.5 (20)

PPT
Insecurity in security products 2013
PDF
Maximize Computer Security With Limited Ressources
PDF
3 Nir Zuk Modern Malware Jun 2011
PDF
Can consumer av products protect
PPTX
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Endpoint Protection
PPTX
Kurt baumgartner lan_deskse2012
PPTX
2013 Security Threat Report Presentation
PDF
Battling Malware In The Enterprise
PPTX
8 Threats Your Anti-Virus Won't Stop
PDF
Dtl 2012 q4_home.1
PDF
Opswat Pazar Payı Raporu / Haziran 2011
PDF
OPSWAT Market Share Report June 2011
PDF
Patch management
PPTX
How Malware Works - Understanding Software Vulnerabilities
PDF
Microsoft Update Security Support
PPTX
Bitdefender Corporate July2011 V3
PDF
CEBIT 2013 - Workshop Presentation
PDF
Cybersecurity Concerns You Should be Thinking About
Insecurity in security products 2013
Maximize Computer Security With Limited Ressources
3 Nir Zuk Modern Malware Jun 2011
Can consumer av products protect
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Endpoint Protection
Kurt baumgartner lan_deskse2012
2013 Security Threat Report Presentation
Battling Malware In The Enterprise
8 Threats Your Anti-Virus Won't Stop
Dtl 2012 q4_home.1
Opswat Pazar Payı Raporu / Haziran 2011
OPSWAT Market Share Report June 2011
Patch management
How Malware Works - Understanding Software Vulnerabilities
Microsoft Update Security Support
Bitdefender Corporate July2011 V3
CEBIT 2013 - Workshop Presentation
Cybersecurity Concerns You Should be Thinking About
Ad

More from DaveEdwards12 (8)

PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PDF
A Journey to Protect Points of Sale (POS)
PPTX
Man in the Browser attacks on online banking transactions
PDF
New realities in aviation security remotely gaining control of aircraft systems
PDF
New realities in aviation security remotely gaining control of aircraft systems
PPTX
Anatomy of business logic vulnerabilities
PPTX
Using 80 20 rule in application security management
PPTX
Top Application Security Trends of 2012
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
A Journey to Protect Points of Sale (POS)
Man in the Browser attacks on online banking transactions
New realities in aviation security remotely gaining control of aircraft systems
New realities in aviation security remotely gaining control of aircraft systems
Anatomy of business logic vulnerabilities
Using 80 20 rule in application security management
Top Application Security Trends of 2012

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cloud_computing_Infrastucture_as_cloud_p
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Insecurity in security products v1.5

  • 1. (In)Security in Security Products Who do you turn to when your security product becomes a gateway for attackers? 1
  • 2. About the report • Security Products are present in most of the systems and theoretically can become a “high pay-off” target for hackers after the OS, Browsers etc. • At iViZ we wanted to study how secure are the security products • iViZ used databases such as the Common Vulnerability Enumeration (CVE), Common Product Enumeration (CPE) and Nation Vulnerability Database (NVD) for the Analysis www.ivizsecurity.com 2
  • 3. How are security vendors doing in terms of protecting their own products? According to our “(In)Security in Security Products” report, • More recently, hackers have claimed to be in possession of the source code for Symantec's PC anywhere tool and Norton antivirus. www.ivizsecurity.com 3
  • 4. Vulnerabilities in Security Products • Man in the Middle (MITM) vulnerability in Symantec Backup Exec 12.1 • Remote Code Execution via buffer overflows vulnerability in Symantec Veritas Enterprise Administrator products • Encryption bypass of major disk encryption software’s including Microsoft Bit locker, True Crypt and MacAfee Safe Boot Device • Remote code execution vulnerabilities in various anti-virus products including AVG, F-Secure, Sophos and ClaimAV etc For Details: http://www.ivizsecurity.com/security-advisory1.html www.ivizsecurity.com 4
  • 5. 6
  • 6. 7
  • 7. 8
  • 8. Vulnerabilities by Security Companies Vulnerabilities by Vendors ClamAV Kaspersky Lab Cisco Trend Micro Symantec McAfee ISS Checkpoint CA 0 200 400 600 800 1000 1200 www.ivizsecurity.com 9
  • 9. Vulnerabilities in Security Products Vulnerabilities in Security Products F-Secure Anti-virus Cisco PIX Firewall Figure 6: Shows number of Sophos Anti-virus vulnerabilities found in Cisco Adaptivesecurity Appliance some of the major security products existing today. X Kaspersky Anti-virus axis display number of vulnerabilities and Y axis ClamAV Anti-virus display some of the major security products. Total Trend Micro Officescan vulnerabilities against each AVG AntiVirus security product are calculated by considering Norton Personal Firewall all the versions of the products and their Norton AntriVirus individual vulnerabilities Checkpoint Firewall-1 discovered over the past years. Symentec Norton Internet Security McAfee Anti Virus 0 10 20 30 40 50 60 70 80 www.ivizsecurity.com 10
  • 10. 11
  • 11. Conclusion The two largest threats to security product vendors/developers are :- • The Black 0-Day Market • Cyber Warfare Vulnerabilities are as common in security products as they are in non – security products. As per the Global Risk 2012 report, the cost of each cyber crime is 5.9 million USD and likely to grow. There is no foolproof solution to mitigate Cyber Warfare Attacks, but we can take suitable measures to ensure security is itself more secure in the future. www.ivizsecurity.com 12
  • 12. Some thoughts.. • Security companies do not necessarily produce secure software • Security products can itself serve as a door for a hacker • Security Products are “High Pay-off” targets since they are present in most systems • APT and Cyber-warfare makes “Security Products” as the next choice www.ivizsecurity.com 13
  • 13. • Are you sure if your web-application is Secure? • Check out our Cloud based Penetration Testing solution with “Zero False Positive Guarantee” : www.ivizsecurity.com Bikash Barai CEO, Co – founder of iViZ Blog: http://bikashbarai.blogspot.in Linkedin: http://www.linkedin.com/pub/bikash-barai/0/7a4/669 Twitter: https://twitter.com/bikashbarai1 Thank you 14

Editor's Notes

  • #2: Should be “Cloud-based”, not “On Demand”