Can Deep CDR Prevent Threats Based on Software Vulnerabilities?
A software vulnerability refers to the weakness of an asset that can be exploited by cyber attackers. Both known vulnerabilities and unknown vulnerabilities can be the root cause of security incidents. Many vulnerabilities are leveraging files to compromise file containers. For example, hackers can leverage the disclosed Microsoft Office vulnerability, CVE-2017-11882, to distribute backdoor malware capable of controlling an infected system, providing attackers with the ability to extract files that execute malicious commands. Deep CDR is effective for addressing file-based vulnerabilities since by rebuilding files it removes malicious commands and exploits hidden in images, videos, and other innocent file formats.
Can Deep CDR Protect Against the Risk of Increasingly Complex File Formats?
File formats are allowing increasingly complex functions through embedded scripts, macros and programming designed to streamline workflows and boost productivity. For example, PDFs may contain an abundance of elements including hyperlinks, media files, forms, Unicode characters and encrypted data. This complexity allows users to be more productive, but also enables malicious actors to embed scripts and exploits that take advantage of the flaws in applications. Deep CDR protects against these file based vulnerabilities as it rebuilds files and prevents malicious commands, scripts, and embedded objects.