Waratek takes your application security program beyond a WAF without using heuristics. Based on patented virtualization technology, Waratek’s application security platform produces zero false positives, requires no code changes, tuning or instrumentation, and takes minutes to install – providing instant protection from the OWASP Top Ten as well as Zero Day attacks. These benefits apply to new and legacy platforms and cannot be provided by your current WAF or emerging technologies like RASP based on instrumentation or filters.
Learn more about a few of the unique approaches to security and application operations available exclusively from Waratek.
of web applications include open source code
(SOURCE: Black Duck)
of all applications have at least one vulnerability in them: more than 13% have at least one critical severity flaw
Known and Zero Day Attack (CWE) Protection
Protection against CWEs using rules that detect and block OWASP Top Ten, SANs 25, and Zero Day attacks.
- Command Injection
- Cross Site Request Forgery (CSRF)
- Cross Site Scripting (XSS)
- Path Traversal
- Local File Include
- SQL Injection
- Untrusted Deserialization
- Missing Encryption of Sensitive Data
- Cleartext Transmission of Sensitive Information
- Unrestricted Upload of File with Dangerous Type
- Direct Use of Unsafe JNI
- Open Redirect
- Improper Input Validation
- Dynamic Code Evaluation: Code Injection
- Use of a Broken or Risky Cryptographic Algorithm
- Unsafe Reflection
- Session Fixation
- External Control of Filename or Path
- Legacy Java Protection
- HTTP Input Validation
Deserialization of Untrusted Data
Some of the most widespread security vulnerabilities to occur over the last couple years are related to when applications deserialize data from untrusted sources.
Waratek’s unique, patented virtualization approach to application security remediates Java object deserialization attacks using a secure runtime container and by turning on a single security rule. The full application stack is automatically protected against Java deserialization attacks, both known or unknown (Zero-Day), without:
- Source code changes
- Application profiling
- Black or white listing
- False positives or negatives
- Breaking existing functionality
The same deserialization vulnerability found in a version of Apache Commons Collections library used in 21% of Java applications was present in developer-authored code used in 25% of Java applications
Learn how we protect against Deserialization without black or white lists
Known Vulnerability (CVE) Protection
Waratek offers protection against CVEs based on routine and emergency patches released by vendors.
Custom CVE patches are also available upon request. Here are just a few CVE patches that are available…..
CVE-2012-2098, CVE-2010-1632, CVE-2012-5785, CVE-2010-1632, CVE-2007-6721, CVE-2016-1000341, CVE-2016-1000343, CVE-2016-1000345, CVE-2016-1000342, CVE-2016-1000339, CVE-2016-1000338, CVE-2016-1000352, CVE-2016-1000344, CVE-2015-7940, CVE-2016-1000346, CVE-2016-1000341, CVE-2016-2510, CVE-2014-0114, CVE-2014-0114, CVE-2014-0114, CVE-2015-7501, CVE-2012-2098, CVE-2013-2186, CVE-2014-0050, CVE-2016-1000031, CVE-2016-3092, CVE-2013-0248, CVE-2013-0248, CVE-2016-3092, CVE-2014-0050, CVE-2016-1000031, CVE-2013-2186, CVE-2014-0050, CVE-2013-0248, CVE-2016-3092, CVE-2012-6153, CVE-2009-4269, CVE-2015-1832, CVE-2014-7810, CVE-2014-3558, CVE-2014-3558, CVE-2014-3558, CVE-2007-4575, CVE-2014-3577, CVE-2015-5262, CVE-2011-1498, CVE-2012-6153, CVE-2015-5262, CVE-2015-5262, CVE-2014-3577, CVE-2015-1833, CVE-2016-6801, CVE-2016-2175, CVE-2009-4611, CVE-2016-5725, CVE-2015-0254, CVE-2017-5929, CVE-2016-3092, CVE-2013-0248, CVE-2014-0050, CVE-2013-2186, CVE-2016-1000031, CVE-2015-2944, CVE-2009-4611, CVE-2014-0114, CVE-2013-2186, CVE-2016-3092, CVE-2016-1000031, CVE-2013-0248, CVE-2014-0050, CVE-2011-4969, CVE-2013-4002, CVE-2009-2625, CVE-2016-6801,CVE-2015-1833, CVE-2012-2098, CVE-2014-0114, CVE-2015-1833, CVE-2013-4002, CVE-2016-6801, CVE-2009-2625, CVE-2016-2175, CVE-2016-3092, CVE-2014-0050, CVE-2012-2138, CVE-2012-2098, CVE-2013-4002, CVE-2009-4269, CVE-2013-0248, CVE-2009-2625, CVE-2013-2186, CVE-2012-0213, CVE-2009-4611, CVE-2017-5644, CVE-2015-1833, CVE-2015-1832, CVE-2014-7810, CVE-2014-9527, CVE-2011-4969, CVE-2015-2944, CVE-2016-6801, CVE-2014-0114, CVE-2016-1000031, CVE-2014-3529, CVE-2014-3574, CVE-2014-7810, CVE-2012-2138, CVE-2017-5644, CVE-2014-3574, CVE-2014-3529, CVE-2012-0213, CVE-2014-9527, CVE-2014-3490, CVE-2014-7839, CVE-2016-6346, CVE-2016-6345, CVE-2009-1190, CVE-2009-1190, CVE-2010-1622, CVE-2010-1622, CVE-2011-2894, CVE-2011-2894, CVE-2014-3578, CVE-2013-4152, CVE-2014-0054, CVE-2014-0225, CVE-2015-3192, CVE-2011-2894, CVE-2010-3700, CVE-2012-5055, CVE-2012-5055, CVE-2010-3700, CVE-2011-2894, CVE-2011-2894, CVE-2012-5055, CVE-2012-5055, CVE-2015-3192, CVE-2013-6430, CVE-2013-6430, CVE-2011-2730, CVE-2013-6430, CVE-2014-0054, CVE-2013-6429, CVE-2016-9878, CVE-2013-6430, CVE-2014-0225, CVE-2013-6430, CVE-2016-9878, CVE-2016-9878, CVE-2015-5211, CVE-2016-9878, CVE-2014-1904, CVE-2014-3625, CVE-2015-0254, CVE-2006-1548, CVE-2014-9527, CVE-2012-2098, CVE-2012-0213, CVE-2014-3574, CVE-2016-2175, CVE-2017-5644, CVE-2014-3529, CVE-2007-6726, CVE-2015-0227, CVE-2014-3623, CVE-2011-2487, CVE-2009-2625, CVE-2014-0107, CVE-2009-2625, CVE-2013-4002, CVE-2009-2625, CVE-2013-4002, CVE-2009-2625, CVE-2013-4517, CVE-2013-2172, CVE-2009-0217, CVE-2013-7285, CVE-2016-3674 and more….
For a full list of the CVEs remediated by Waratek, ask your Waratek representative or contact us by email.
Waratek offers a Virtual Patch for customers to address the new high severity vulnerability – CVE-2017-5638 – that exposes organizations using the Struts 2 framework to any general code injection attack. The Waratek solution fully remediates this vulnerability with a virtual patch that can be live-updated without taking affected applications out of production.
“Struts 2 users need to take immediate action. Applying the binary patch offered by Apache requires some application downtime,” noted John Matthew Holt, Waratek’s Founder and CTO. “For users who have made custom changes on Struts source code, it could take days or weeks to upgrade. A virtual patch can be applied immediately while the application continues to run – with no code changes and without restarting the application.”
Even prior to the announcement of the vulnerability, Waratek’s core functionality protected against Proof-Of-Concept (POC) exploits of CVE-2017-5638 that perform remote-command execution. The new virtual patch is a specific one-line security rule that fully remediates this vulnerability and was developed in less than one-day after the vulnerability was announced.
First introduced in Struts 2.3.5 released in October 2012, the vulnerability identified in CVE-2017-5638 has been available for Zero Day exploits for more than four years.
Compiler Based Runtime Application Self Protection (RASP)
Providing unique patented runtime protection
Applications today are generally protected by ineffective Web Application Firewalls (WAFs) and other tools that rely heavily on instrumentation or filters to guess if a request is a malicious attack or a permissible action. Such heuristic-based approaches often produce false positives at an unacceptably high rate. In a recent Cisco report, nearly 45% of organizations receive at least 1.8 million security alerts each year, 1.3 million of which are false alarms or never investigated.
NO FALSE POSITIVES SECURITY
Waratek’s patented virtualization-based security technology allows us to determine if an operation is an attack or a permissible request with 100% accuracy. During the two years our patented technology has been in global production, it has never produced a false positive.
If that wasn’t enough, Waratek also offer a “No Break” Guarantee – Waratek’s virtual patches will not break your applications.
Name Space Layout Randomization
Name Space Layout Randomization or NSLR is the equivalent of Address Space Layout Randomization (ASLR) for Java-based applications. Developed by Waratek, NSLR hardens the Java Virtual Machine (JVM) by randomizing the JDK namespace (Java packages), which makes code injection exploits so difficult to execute that they become unfeasible.
Attempts to brute force a system and retrieve the randomized package name will not work. Waratek’s standard configuration includes NSLR with a minimum level of security at 96-bit names, which would likely require several thousand years to crack the encryption. Names can be randomized up to 1024 bits.
Container security: How Waratek blocks Java exploits
Waratek relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.
The Java Deserialization Problem
The Java deserialization problem occurs when applications deserialize data from untrusted sources and is one of the most widespread security vulnerabilities to occur over the last couple years. This article will…Read More
Why Are Deserialization Vulnerabilities So Popular?
Wondering why deserialization vulnerabilities are so popular? Learn more about deserialization, why it happens, and CPU fixes. In 2017, around 60 remote code execution (RCE) deserialization vulnerabilities were reported, not…Read More
Serialization is dead! Long live serialization!
Oracle has declared an end to Java’s serialization approach, but that’s not the end of the story. Oracle has signaled there are big changes on the way for how Java…Read More
New Remote Code Execution Vulnerability – Spring Break – CVE-2017-8046
Remote Code Execution Vulnerability (CVE-2017-8046) in Pivotal’s Spring Framework Unvalidated user input is the source of most security risks. Using unvalidated user input in an expression language creates a critical…Read More
Installing the Oracle CPU Can Lead to a False Sense of Security
If you installed the latest Oracle CPU and believe that this alone makes you secure, think again. Without enabling and properly configuring the Serialization Global Filter, flaws may be fully…Read More
ASLR was a security game changer. Could expanding the concept be one, too?
As long as there has been a commercial internet, cybersecurity has largely been predicated on the concept of guess work, better known as Heuristics. Looking for patterns or matching words…Read More
Try A Demo
& Get Protected.
Get a free POC when you schedule now.