Active Protection
Application Security Platform
A cohesive solution for Application Security Teams
Waratek takes your application security program beyond a WAF without using heuristics. Based on patented virtualization technology, Waratek’s application security platform produces zero false positives, requires no code changes, tuning or instrumentation, and takes minutes to install – providing instant protection from the OWASP Top Ten as well as Zero Day attacks. These benefits apply to new and legacy platforms and cannot be provided by your current WAF or emerging technologies like RASP based on instrumentation or filters.
Learn more about a few of the unique approaches to security and application operations available exclusively from Waratek.
of web applications include open source code
(SOURCE: Black Duck)
of all applications have at least one vulnerability in them: more than 13% have at least one critical severity flaw
(SOURCE: Veracode)
Known and Zero Day Attack (CWE) Protection
Protection against CWEs using rules that detect and block OWASP Top Ten, SANs 25, and Zero Day attacks.
- Command Injection
- Cross Site Request Forgery (CSRF)
- Cross Site Scripting (XSS)
- Path Traversal
- Local File Include
- SQL Injection
- Untrusted Deserialization
- Missing Encryption of Sensitive Data
- Cleartext Transmission of Sensitive Information
- Unrestricted Upload of File with Dangerous Type
- Direct Use of Unsafe JNI
- Open Redirect
- Improper Input Validation
- Dynamic Code Evaluation: Code Injection
- Use of a Broken or Risky Cryptographic Algorithm
- Unsafe Reflection
- Session Fixation
- External Control of Filename or Path
- Legacy Java Protection
- Clickjacking
- HTTP Input Validation
Deserialization of Untrusted Data
Some of the most widespread security vulnerabilities to occur over the last couple years are related to when applications deserialize data from untrusted sources.
Waratek’s unique, patented virtualization approach to application security remediates Java object deserialization attacks using a secure runtime container and by turning on a single security rule. The full application stack is automatically protected against Java deserialization attacks, both known or unknown (Zero-Day), without:
- Source code changes
- Configuration
- Application profiling
- Black or white listing
- False positives or negatives
- Breaking existing functionality
The same deserialization vulnerability found in a version of Apache Commons Collections library used in 21% of Java applications was present in developer-authored code used in 25% of Java applications
(Source: Veracode)
SUGGESTED VIEWING:
Learn how we protect against Deserialization without black or white lists
Known Vulnerability (CVE) Protection
Waratek offers protection against CVEs based on routine and emergency patches released by vendors.
Custom CVE patches are also available upon request. Here are just a few CVE patches that are available…..
CVE-2012-2098, CVE-2010-1632, CVE-2012-5785, CVE-2010-1632, CVE-2007-6721, CVE-2016-1000341, CVE-2016-1000343, CVE-2016-1000345, CVE-2016-1000342, CVE-2016-1000339, CVE-2016-1000338, CVE-2016-1000352, CVE-2016-1000344, CVE-2015-7940, CVE-2016-1000346, CVE-2016-1000341, CVE-2016-2510, CVE-2014-0114, CVE-2014-0114, CVE-2014-0114, CVE-2015-7501, CVE-2012-2098, CVE-2013-2186, CVE-2014-0050, CVE-2016-1000031, CVE-2016-3092, CVE-2013-0248, CVE-2013-0248, CVE-2016-3092, CVE-2014-0050, CVE-2016-1000031, CVE-2013-2186, CVE-2014-0050, CVE-2013-0248, CVE-2016-3092, CVE-2012-6153, CVE-2009-4269, CVE-2015-1832, CVE-2014-7810, CVE-2014-3558, CVE-2014-3558, CVE-2014-3558, CVE-2007-4575, CVE-2014-3577, CVE-2015-5262, CVE-2011-1498, CVE-2012-6153, CVE-2015-5262, CVE-2015-5262, CVE-2014-3577, CVE-2015-1833, CVE-2016-6801, CVE-2016-2175, CVE-2009-4611, CVE-2016-5725, CVE-2015-0254, CVE-2017-5929, CVE-2016-3092, CVE-2013-0248, CVE-2014-0050, CVE-2013-2186, CVE-2016-1000031, CVE-2015-2944, CVE-2009-4611, CVE-2014-0114, CVE-2013-2186, CVE-2016-3092, CVE-2016-1000031, CVE-2013-0248, CVE-2014-0050, CVE-2011-4969, CVE-2013-4002, CVE-2009-2625, CVE-2016-6801,CVE-2015-1833, CVE-2012-2098, CVE-2014-0114, CVE-2015-1833, CVE-2013-4002, CVE-2016-6801, CVE-2009-2625, CVE-2016-2175, CVE-2016-3092, CVE-2014-0050, CVE-2012-2138, CVE-2012-2098, CVE-2013-4002, CVE-2009-4269, CVE-2013-0248, CVE-2009-2625, CVE-2013-2186, CVE-2012-0213, CVE-2009-4611, CVE-2017-5644, CVE-2015-1833, CVE-2015-1832, CVE-2014-7810, CVE-2014-9527, CVE-2011-4969, CVE-2015-2944, CVE-2016-6801, CVE-2014-0114, CVE-2016-1000031, CVE-2014-3529, CVE-2014-3574, CVE-2014-7810, CVE-2012-2138, CVE-2017-5644, CVE-2014-3574, CVE-2014-3529, CVE-2012-0213, CVE-2014-9527, CVE-2014-3490, CVE-2014-7839, CVE-2016-6346, CVE-2016-6345, CVE-2009-1190, CVE-2009-1190, CVE-2010-1622, CVE-2010-1622, CVE-2011-2894, CVE-2011-2894, CVE-2014-3578, CVE-2013-4152, CVE-2014-0054, CVE-2014-0225, CVE-2015-3192, CVE-2011-2894, CVE-2010-3700, CVE-2012-5055, CVE-2012-5055, CVE-2010-3700, CVE-2011-2894, CVE-2011-2894, CVE-2012-5055, CVE-2012-5055, CVE-2015-3192, CVE-2013-6430, CVE-2013-6430, CVE-2011-2730, CVE-2013-6430, CVE-2014-0054, CVE-2013-6429, CVE-2016-9878, CVE-2013-6430, CVE-2014-0225, CVE-2013-6430, CVE-2016-9878, CVE-2016-9878, CVE-2015-5211, CVE-2016-9878, CVE-2014-1904, CVE-2014-3625, CVE-2015-0254, CVE-2006-1548, CVE-2014-9527, CVE-2012-2098, CVE-2012-0213, CVE-2014-3574, CVE-2016-2175, CVE-2017-5644, CVE-2014-3529, CVE-2007-6726, CVE-2015-0227, CVE-2014-3623, CVE-2011-2487, CVE-2009-2625, CVE-2014-0107, CVE-2009-2625, CVE-2013-4002, CVE-2009-2625, CVE-2013-4002, CVE-2009-2625, CVE-2013-4517, CVE-2013-2172, CVE-2009-0217, CVE-2013-7285, CVE-2016-3674 and more….
For a full list of the CVEs remediated by Waratek, ask your Waratek representative or contact us by email.
Waratek offers a Virtual Patch for customers to address the new high severity vulnerability – CVE-2017-5638 – that exposes organizations using the Struts 2 framework to any general code injection attack. The Waratek solution fully remediates this vulnerability with a virtual patch that can be live-updated without taking affected applications out of production.
“Struts 2 users need to take immediate action. Applying the binary patch offered by Apache requires some application downtime,” noted John Matthew Holt, Waratek’s Founder and CTO. “For users who have made custom changes on Struts source code, it could take days or weeks to upgrade. A virtual patch can be applied immediately while the application continues to run – with no code changes and without restarting the application.”
Even prior to the announcement of the vulnerability, Waratek’s core functionality protected against Proof-Of-Concept (POC) exploits of CVE-2017-5638 that perform remote-command execution. The new virtual patch is a specific one-line security rule that fully remediates this vulnerability and was developed in less than one-day after the vulnerability was announced.
First introduced in Struts 2.3.5 released in October 2012, the vulnerability identified in CVE-2017-5638 has been available for Zero Day exploits for more than four years.
Compiler Based Runtime Application Self Protection (RASP)
Providing unique patented runtime protection
Applications today are generally protected by ineffective Web Application Firewalls (WAFs) and other tools that rely heavily on instrumentation or filters to guess if a request is a malicious attack or a permissible action. Such heuristic-based approaches often produce false positives at an unacceptably high rate. In a recent Cisco report, nearly 45% of organizations receive at least 1.8 million security alerts each year, 1.3 million of which are false alarms or never investigated.
NO FALSE POSITIVES SECURITY
Waratek’s patented virtualization-based security technology allows us to determine if an operation is an attack or a permissible request with 100% accuracy. During the two years our patented technology has been in global production, it has never produced a false positive.
If that wasn’t enough, Waratek also offer a “No Break” Guarantee – Waratek’s virtual patches will not break your applications.
Name Space Layout Randomization
Name Space Layout Randomization or NSLR is the equivalent of Address Space Layout Randomization (ASLR) for Java-based applications. Developed by Waratek, NSLR hardens the Java Virtual Machine (JVM) by randomizing the JDK namespace (Java packages), which makes code injection exploits so difficult to execute that they become unfeasible.
Attempts to brute force a system and retrieve the randomized package name will not work. Waratek’s standard configuration includes NSLR with a minimum level of security at 96-bit names, which would likely require several thousand years to crack the encryption. Names can be randomized up to 1024 bits.
CSO Review
Container security: How Waratek blocks Java exploits
Waratek relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.
Technical Analysis
Oracle April 2020 CPU represents a double-digit increase in software patches
Oracle Critical Patch Update Preview: April 2020 CPU could top 400 patches, a double-digit year-over-year increase
[Updated] New WebLogic Zero-Day RCE Vulnerability
Q2 2019 Oracle CPU: Uptick in Severity for Oracle Vulnerabilities
Try A Demo
& Get Protected.
Get a free POC when you schedule now.