{"id":216,"date":"2024-02-19T17:45:30","date_gmt":"2024-02-19T17:45:30","guid":{"rendered":"https:\/\/snakeeyessoftware.com\/site\/?p=216"},"modified":"2024-02-29T05:49:01","modified_gmt":"2024-02-29T05:49:01","slug":"reachability-and-exploitability-a-false-refuge-in-software-security","status":"publish","type":"post","link":"https:\/\/snakeeyessoftware.com\/site\/2024\/02\/reachability-and-exploitability-a-false-refuge-in-software-security\/","title":{"rendered":"Reachability and Exploitability: A False Refuge in Software Security"},"content":{"rendered":"<div class=\"conversation-container ng-tns-c1234278934-175 visd-patch ng-star-inserted\">\n<div class=\"ng-tns-c902142359-370\">\n<div class=\"response-container ng-tns-c305439240-371 ui-v2-enabled ng-star-inserted\">\n<div class=\"presented-response-container ng-tns-c305439240-371\">\n<div class=\"response-container-content ng-tns-c305439240-371\">\n<div class=\"response-content ng-trigger ng-trigger-responsePopulation ng-tns-c305439240-371\">\n<div class=\"markdown markdown-main-panel ui-v2-enabled\" dir=\"ltr\">\n<p data-sourcepos=\"5:1-5:318\">Note: Note:\u00a0 This content was generated with AI as part of a test.\u00a0 The other article can be found at https:\/\/snakeeyessoftware.com\/site\/2024\/02\/when-reachability-and-exploitability-dictate-software-security-decisions-a-critical-examination\/<\/p>\n<p data-sourcepos=\"5:1-5:318\">\n<p data-sourcepos=\"5:1-5:318\">We live in a world of increasing technological reliance and, sadly, an equally accelerating rate of cyberattacks. As a software security expert with over two decades of experience, I&#8217;ve repeatedly seen &#8220;reachability&#8221; and &#8220;exploitability&#8221; used as weak shields to excuse inaction in addressing software vulnerabilities.<\/p>\n<p data-sourcepos=\"7:1-7:204\">This approach fails in a world of complex software systems and evolving attack techniques. It also undermines the core mission of any software security posture: proactive defense against emerging threats.<\/p>\n<p data-sourcepos=\"9:1-9:36\"><strong>The Argument: A Convenient Delay<\/strong><\/p>\n<p data-sourcepos=\"11:1-11:304\">&#8220;It&#8217;s not reachable, not exploitable&#8221; \u2013 this refrain lulls teams into a false sense of security. Those pushing back on prioritizing or reporting a vulnerability paint a narrative of immunity as long as reachability and exploitability flags aren&#8217;t raised. The problem? This logic is dangerously deceptive.<\/p>\n<p data-sourcepos=\"13:1-13:140\">Let&#8217;s break down the key reasons why prioritizing vulnerability fixes cannot be held hostage to the perceived difficulty of exploiting them:<\/p>\n<p data-sourcepos=\"15:1-15:50\"><strong>1. Flawed Testing and Shifting Attack Surfaces<\/strong><\/p>\n<p data-sourcepos=\"17:1-17:414\">Determining reachability and exploitability through testing is an incredibly complex and imperfect task. Modern software systems are a labyrinth of dynamic code execution and dependencies, making it easy to miss hidden pathways. Infamous incidents like Log4Shell demonstrate how vulnerabilities, initially appearing benign, can lead to wide-ranging havoc in unpredictable ways as code and threat scenarios evolve.<\/p>\n<p data-sourcepos=\"19:1-19:42\"><strong>2. The Ticking Clock of Technical Debt<\/strong><\/p>\n<p data-sourcepos=\"21:1-21:427\">Delaying a fix under the guise of low reachability or exploitability only compounds the problem. The longer the upgrade is postponed, the more extensive and complex it becomes due to additional development relying on vulnerable libraries.. This slows down feature development and makes future upgrade work even more costly and disruptive. Proactive vulnerability management avoids this dangerous accumulation of technical debt.<\/p>\n<p data-sourcepos=\"23:1-23:47\"><strong>3. Responsibility to the Software Ecosystem<\/strong><\/p>\n<p data-sourcepos=\"25:1-25:399\">In a connected digital world, one vulnerable component becomes everyone&#8217;s problem. Open-source and widely used libraries, when they carry flaws, ripple outward. Holding back on reporting or fixing vulnerabilities burdens maintainers with supporting increasingly outdated versions, hindering overall code quality. A more responsible approach is to promptly update, making the entire ecosystem safer.<\/p>\n<p data-sourcepos=\"27:1-27:33\"><strong>4. The Test of Replaceability<\/strong><\/p>\n<p data-sourcepos=\"29:1-29:318\">If fixing a vulnerability is genuinely unreachable or not exploitable, it raises a bigger question: why keep that component at all? If you truly can&#8217;t be bothered with it, replacing it with a more secure alternative is often the easier and safer choice. After all, if it won&#8217;t affect your operations, what&#8217;s the worry?<\/p>\n<p data-sourcepos=\"31:1-31:22\"><strong>A Case for Urgency<\/strong><\/p>\n<p data-sourcepos=\"33:1-33:323\">Using reachability and exploitability as a justification for delays betrays a deeper security issue: prioritizing convenience over resilience. Every known vulnerability is a potential entry point for future attacks \u2013 whether or not a &#8216;reachable&#8217;, easy exploit exists <em>today<\/em>. It&#8217;s only a matter of time before that changes.<\/p>\n<p data-sourcepos=\"35:1-35:151\">In software security, just as in the real world, we don&#8217;t wait until the intruder bursts through the door. We change the locks and secure the windows.<\/p>\n<p data-sourcepos=\"37:1-37:17\"><strong>A New Mindset<\/strong><\/p>\n<p data-sourcepos=\"39:1-39:329\">Vulnerability management should focus on continuous improvement, not nitpicking reachability or exploitability. Aim to eliminate or reduce all known vulnerabilities \u2013 regardless of current perceived exploit complexity. That&#8217;s the best way to protect your organization and contribute to a more secure software world for everyone.<\/p>\n<p data-sourcepos=\"41:1-41:198\">Let&#8217;s stop enabling &#8216;security theater&#8217; and focus on truly reducing cyber risk. Don&#8217;t let &#8220;not reachable&#8221; and &#8220;not exploitable&#8221; be used as a lullaby that leads to complacency. We all deserve better.<\/p>\n<\/div>\n<div class=\"response-footer ng-tns-c902142359-370 gap complete\">\n<div class=\"sources-list-container\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"response-container-footer ng-tns-c305439240-371 visd-patch ui-v2-enabled\">\n<div class=\"actions-container-v2 ng-star-inserted\">\n<div class=\"buttons-container-v2 ng-star-inserted\"><button class=\"mat-mdc-tooltip-trigger icon-button mdc-button mat-mdc-button mat-unthemed mat-mdc-button-base gmat-mdc-button ng-star-inserted\" aria-label=\"Good response\" aria-pressed=\"false\" aria-controls=\"feedback-form-0\"><\/button><button class=\"mat-mdc-tooltip-trigger icon-button mdc-button mat-mdc-button mat-unthemed mat-mdc-button-base gmat-mdc-button ng-star-inserted\" aria-label=\"Bad response\" aria-pressed=\"false\" aria-controls=\"feedback-form-0\"><\/button><\/p>\n<div class=\"menu-button-wrapper ng-star-inserted\"><button class=\"mat-mdc-menu-trigger mat-mdc-tooltip-trigger icon-button mdc-button mat-mdc-button gmat-mdc-button-with-prefix mat-unthemed mat-mdc-button-base gmat-mdc-button ng-star-inserted\" aria-label=\"Share &amp; export\" aria-haspopup=\"menu\" aria-expanded=\"false\">share<\/button><\/div>\n<div class=\"menu-button-wrapper ng-star-inserted\"><\/div>\n<div class=\"menu-button-wrapper ng-star-inserted\"><button class=\"mat-mdc-menu-trigger mat-mdc-tooltip-trigger icon-button mdc-button mat-mdc-button gmat-mdc-button-with-prefix mat-unthemed mat-mdc-button-base gmat-mdc-button ng-star-inserted\" aria-label=\"Show more options\" aria-haspopup=\"menu\" aria-expanded=\"false\" aria-describedby=\"cdk-describedby-message-ng-1-124\">more_vert<\/button><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"feedback-form-0\" class=\"ng-tns-c902142359-370\"><\/div>\n<div id=\"factuality-form-0\" class=\"related-search-footer ng-tns-c902142359-370 complete\"><\/div>\n<\/div>\n<div class=\"restart-chat-button-scroll-placeholder ng-tns-c1234278934-175 ng-star-inserted\"><\/div>\n<\/div>\n<div class=\"conversation-container ng-tns-c1234278934-175 visd-patch ng-star-inserted\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Note: Note:\u00a0 This content was generated with AI as part of a test.\u00a0 The other [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,5],"tags":[9,27],"class_list":{"0":"post-216","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-artificial-intelligence","8":"category-security","9":"tag-ai","10":"tag-appsec","12":"post-with-thumbnail","13":"post-with-thumbnail-large"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/snakeeyessoftware.com\/site\/wp-content\/uploads\/2024\/02\/timebomb.jpeg?fit=1024%2C1024&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/posts\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/comments?post=216"}],"version-history":[{"count":1,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/posts\/216\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/posts\/216\/revisions\/222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/media\/217"}],"wp:attachment":[{"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/media?parent=216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/categories?post=216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/snakeeyessoftware.com\/site\/wp-json\/wp\/v2\/tags?post=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}