Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Apple iOS Vulnerabilities

by Cody Dumont
August 3, 2016

Apple iOS Vulnerabilities

As BYOD (Bring Your Own Device) is incorporated into corporate environments, the risk profile of an organization must expand to include mobile devices. SecurityCenter supports collecting information on BYOD mobile devices through passive detection methods, and mobile device data from Mobile Device Management (MDM) solutions using Nessus. This dashboard helps the security operations team to identify threats from Apple iOS devices.

For many organizations, including mobile devices in their vulnerability management programs is challenging. Mobile devices can connect and disconnect from the network at any time, and scanning these devices for vulnerabilities and compliance violations can be very difficult. The result of excluding mobile devices as part of the risk profile makes for a less secure environment and less informed risk management team, which can lead to inconsistent security and compliance policies for mobile devices. To help address these issues, SecurityCenter has the ability to scan MDM solutions such as Apple Profile Manager, Microsoft ActiveSync, VMWare AirWatch, MobileIron MDM, and Good Technology MDM.

SecurityCenter Continuous View (CV) includes the additional feature of detecting mobile devices using the Passive Vulnerability Scanner (PVS). PVS can detect a wide variety of devices, such as those running Apple iOS. An advanced feature provided by PVS is OS detection using deep packet analysis. PVS includes a variety of checks, which look for Apple iPhones, iPods, and iPads that have not been updated with the latest security checks.

This report combines both collection methods into a single place to easily understand the risk associated with allowing Apple iOS devices to be used on the network. Several of the elements compare the MDM-collected data with data collected by PVS and stored in the Cumulative database. The Cumulative database is the location where SecurityCenter stores all vulnerability data that has been recently collected from Nessus, PVS and LCE. The MDM database is a specialized database populated by connecting to a MDM solution. Other elements list devices identified as Apple iOS devices and their users. Combined together, this report will provide a more accurate picture of Apple iOS device activities and risk.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards and assets. The report can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments. The report requirements are:

  • SecurityCenter 5.3.2
  • Nessus 6.5.6
  • PVS 5.0.0
  • MDM Repository

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. SecurityCenter CV shows risk across all systems, including cloud, virtual, mobile and traditional systems, enabling informed decisions. SecurityCenter CV provides tight integration and API extensibility with SIEMs, malware defenses, patch management tools, BYOD, firewalls, and virtualization systems. PVS is a sensor for SecurityCenter CV, an upgrade to SecurityCenter, and provides deep packet inspection enables discovery and assessment of operating systems, network devices, hypervisors, databases, tablets, phones, web servers, cloud applications, and critical infrastructure.

Chapters

Executive Summary: This chapter provides the executive with high level overview of the risk using Apple iOS products on the network. The chapter contains a comparison between the vulnerability data collected using MDM solutions, and the data collected using PVS. The chapter also provides and trend analysis over the past 25 days of passive vulnerabilities. When comparing the two data sources, the numbers should be relatively the same. If the numbers are dramatically different then there could be unauthorized mobile devices on the network.

Vulnerability Summary: This chapter provides a detailed list of the systems identified as using the Apple iOS via OS detection and Browser User Agent detection. The chapter contains two elements and sections to provide a high level summary of subnets where Apple iOS devices are detected and the vulnerability details of each device.

MDM Details: This chapter provides a summary of the users, devices, and vulnerabilities detected using the supported MDM solutions. The information displayed contains the device ID, which enables the analyst to detect when a user replaces a device, vulnerability counts, and models.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training