CH-7 Cheatsheet (Cybersecurity Vulnerabilities)
1. Application-Based Vulnerabilities
● Buffer Overflow: Exceeds memory boundary → crash/code execution.
○ Fix: Input validation, bounds checking.
● Race Conditions: Two threads access same resource unsafely.
○ Fix: Use locks/synchronization.
● Input Validation Failures: Unsanitized inputs → code injection.
○ Fix: Sanitize/validate input.
2. OS-Based Vulnerabilities
● Privilege Escalation: Gain higher-level access.
○ Fix: Patch management, least privilege.
● Unpatched Systems: Known bugs left unfixed.
○ Fix: Regular updates.
● Insecure Services: Weak/default configs.
○ Fix: Disable unused services, secure configs.
3. Web-Based Vulnerabilities
● SQL Injection (SQLI): Inject SQL via inputs.
○ Fix: Input validation, parameterized queries, stored procedures.
● XSS (Cross-Site Scripting): Inject JS in browser context.
○ Fix: Sanitize output, use CSP, encode data.
4. Hardware Vulnerabilities
● Firmware Bugs: Low-level flaws → full system compromise.
○ Fix: Firmware updates, secure boot.
● EOL Systems: No vendor support.
○ Fix: Replace or isolate, segment network.
● Legacy Systems: Outdated, insecure tech.
○ Fix: Upgrade, restrict access.
5. Network-Based Vulnerabilities
● Sniffing: Capturing network traffic.
○ Fix: Use encryption (TLS, VPN).
● Spoofing: Faking identity/IP.
○ Fix: Authentication, network segmentation.
● DDoS: Overload server.
○ Fix: Firewalls, rate limiting, CDNs.
6. Cryptographic Vulnerabilities
● CA Compromise: Fake certificates.
○ Fix: Certificate pinning, CT logs.
● Key Compromise: Stolen/weak keys.
○ Fix: HSMs, key rotation.
● Flawed Implementation: Bugs in crypto code.
○ Fix: Use vetted libraries, audits.
● Outdated Algorithms: Weak ciphers (e.g. MD5, DES).
○ Fix: Use AES, SHA-256, RSA-2048+.
● Side-Channel Attacks: Exploit timing/power.
○ Fix: Constant-time ops, shielding.
● Backdoors: Hidden access.
○ Fix: Use audited open-source tools.
● Weak RNGs: Predictable keys.
○ Fix: CSPRNGs, hardware entropy.
● CRL/OCSP Issues: Ignored revocations.
○ Fix: Enforce OCSP, monitor infrastructure.
● Key Management Errors: Poor key handling.
○ Fix: Secure storage, rotation, recovery plans.
● SSL Stripping: Downgrade HTTPS → HTTP.
○ Fix: HSTS, force HTTPS.
● Protocol Downgrade: Force weak SSL/TLS.
○ Fix: Disable SSLv3/TLS1.0, enforce strong ciphers.
7. Misconfiguration Vulnerabilities
● Network Devices: Default creds, open ports.
○ Fix: Change defaults, patch firmware.
● Firewalls: Loose rules, unmonitored ports.
○ Fix: Least privilege, audit rules.
● Default Credentials: Vendor passwords.
○ Fix: Change during setup, strong policies.
● Unpatched Software: Old versions.
○ Fix: Patch management, auto-updates.
● Excessive Privileges: Unnecessary access.
○ Fix: RBAC, periodic audits.