AWS Vulnerability Top Ten Executive Report
AWS Vulnerability Top Ten Executive Report
Table of Contents
About this report ............................................................................................................................................................... 1
Executive Summary
Organizations can best deal with vulnerabilities in the environment when analysts are aware of the threat.
Once analysts are best informed of the vulnerabilities present, analysts and administrators can work
to remediate the vulnerabilities or mitigate the risk. This report helps to illustrate vulnerabilities across
both traditional and new threat vectors. Office productivity software is one example of a traditional threat
vector. New threats to the organization include mobile devices as part of “Bring-Your-Own-Device” (BYOD)
strategies as well as potential data leaks in the environment.
The “Top 10 Most Vulnerable Hosts” table uses vulnerability scores to prioritize hosts and present a top
10 list. The score is assessed from the weights assigned to the vulnerability severity levels. Analysts can
use this information to help form remediation strategies based on the ten most vulnerable hosts in the
organization.
The “Top 10 Most Vulnerable Exploitable Hosts” table element focuses on hosts that have vulnerabilities
that have exploits available. Having two different views of hosts can help articulate the differences of
vulnerabilities present on hosts in the organization.
The “Top 10 Most Vulnerable Subnets” table uses the vulnerability score calculated across a Class C
network range of hosts to build a top ten list. Using this information, analysts can focus their remediation
efforts on the most vulnerable networks.
The “Top 10 Most Vulnerable Exploitable Subnets” table element focuses on network subnets with
vulnerabilities that have exploits available. Having two different views of network subnets can help articulate
the differences of vulnerabilities present in network subnets in the organization.
Top 10 Remediations
The “Top 10 Remediations” chapter presents a list of the top 10 remediations for the organization. The
"Top 10 Remediations" table component is filtered on vulnerabilities with a severity of high or critical. The
component is then sorted by the highest risk reduction percentage assigned for each vulnerability. Each
remediation displays the solution of the vulnerability for remediation, a risk reduction percentage, the number
of hosts affected by the vulnerability and the vulnerability percentage. Vulnerabilities detected with Nessus
and PVS offer remediation guidance to assist analysts. Implementing these remediations will decrease the
vulnerability risk of the organization.
Top 10 Remediations
Upgrading to the latest versions for Apache Log4j is highly recommended as intermediate versions / patches have known high severity vulnerabilitie
s and the vendor is updating their advisories often as new research and knowledge about the impact of Log4j is discovered. Refer to https://logging.
apache.org/log4j/2.x/security.html for the latest versions.
7.22% 132 2.61%
Solution: Fix Unix Operating System Unsupported Version Detection
4.95% 90 1.78%
Solution: Fix CentOS 7 : nss (CESA-2021:4904)
4.36% 245 4.84%
Solution: Fix CentOS 7 : sssd (CESA-2021:3336)
3.20% 233 4.60%
Solution: Fix CentOS 7 : samba (CESA-2021:5192)
3.04% 221 4.37%
Solution: Fix CentOS 7 : perl (CESA-2021:0343)
2.97% 216 4.27%
Solution: Fix CentOS 7 : glibc (CESA-2021:0348)
2.91% 212 4.19%
Solution: Fix CentOS 7 : net-snmp (CESA-2020:5350)
2.90% 211 4.17%
Solution: Fix CentOS 7 : expat (CESA-2020:3952)
2.83% 206 4.07%