Understanding Security Findings
Learn to interpret CortexEDR security findings effectively. Understand vulnerability patterns, risk assessment, and how to prioritize remediation efforts for maximum security impact.
🔍 Common Vulnerability Patterns
Injection Attacks
SQL Injection
Malicious SQL code execution through user input. Most common web vulnerability.
Command Injection
System command execution through unsanitized input.
Authentication Issues
Broken Authentication
Flawed session management or credential handling.
Weak Password Policies
Insufficient password requirements or enforcement.
📊 Severity Assessment Framework
Risk Scoring Methodology
Impact Factors
Exploitability Factors
🏷️ CWE Classification System
Common Weakness Enumeration (CWE) provides a standardized way to categorize software weaknesses. Understanding CWE IDs helps prioritize remediation based on industry standards.
Critical CWE Categories
CWE-79CriticalCWE-89CriticalCWE-287HighCommon CWE Patterns
CWE-200Info LeakCWE-400DoSCWE-502DeserializationCWE Research Resources
🎯 Distinguishing Real Issues from False Positives
✅ Likely Real Issues
Direct User Input
Code that directly uses unsanitized user input in SQL queries, HTML output, or system commands.
Known Vulnerable Patterns
Code that matches well-known vulnerable patterns from security databases.
Privilege Escalation
Code that allows unauthorized access to sensitive resources or functions.
⚠️ Potential False Positives
Sanitized Input
Input that has been properly validated, escaped, or parameterized.
Internal/Trusted Data
Data from internal systems or trusted sources that cannot be manipulated by users.
Dead/Test Code
Code that is unreachable, in test files, or not deployed to production.
Verification Checklist
For SQL Injection Findings:
- • Is input parameterized?
- • Are prepared statements used?
- • Is input properly escaped?
- • Is user input validated?
For XSS Findings:
- • Is output properly escaped?
- • Is Content Security Policy set?
- • Is input sanitized?
- • Are templates secure?
🎯 Remediation Prioritization Strategy
Priority Matrix
| Impact | High Exploitability | Medium Exploitability | Low Exploitability |
|---|---|---|---|
| Critical Impact | P0 - Fix Immediately | P0 - Fix Immediately | P1 - Fix This Sprint |
| High Impact | P1 - Fix This Sprint | P2 - Fix Next Sprint | P3 - Plan for Later |
| Medium Impact | P2 - Fix Next Sprint | P3 - Plan for Later | P4 - Technical Debt |
P0 - Critical
Active exploitation possible. Fix immediately, potentially deploy out-of-band.
P1 - High
High risk vulnerabilities. Include in current sprint planning.
P2 - Medium
Moderate risk issues. Plan for next sprint or release cycle.
Understanding Findings
Risk Assessment
Common CWE IDs
CWE-79XSSCWE-89SQL InjectionCWE-287Auth IssuesCWE-200Info Leak