Virtual Patching – the biggest nonsense I’ve ever heard about

It’s time for my Monday morning rant. I guess, I’m turning slowly into a grumpy old man. And today, it is about something which came on my radar some weeks ago. After understanding what it means, I declare Virtual Patching – the biggest nonsense I’ve ever heard about.

Virtual Patching - the biggest nonsense I've ever heard about

Photo by Trym Nilsen on Unsplash

 

Virtual Patching??

If you read this term for the first time, you may scratch your eyes at first as I did weeks ago when I read “Virtual Patching” in a brochure from a company offering Oracle services. I did ask the person who shared it with me, and we both were more or less wondering. How can you patch “virtually“? Or is this a new marketing gimmick, such as a patch flying in from outer space?

How can a patch be “virtual“? Especially since I’d expect a patch in reality “non-virtual” of course.

Or is it a new magic technology I may have missed so far??

As some of you know, in our team we patch quite a bit. Patching is closely related to database upgrades and migrations. In our reference projects we assist customers in having their environments setup up correctly before going live. In addition, we closely work together with our Advanced Customer Support teams across the globe synchronizing our patching knowledge.

But even there in our regular calls and email exchanges, nobody has ever mentioned “virtual patching“.

I discussed this with Daniel, and he sent me a link to a blog post from Pete Finnigan, a top Oracle security expert. Let me quote Pete with his permission (thank you, Pete!):

http://www.petefinnigan.com/weblog/archives/00001481.htm

Another option that started to appear around 15 years ago is the idea of virtual patching. This is the idea that you cannot or don’t want to patch with Oracle’s security patch so you deploy network software that is a special version of an application firewall or intrusion detection / prevention system. The way this works is that network packets are sniffed (or shared memory attached and parsed) and attacks that could exploit issues fixed in Oracle’s security patch are detected. This is complex and prone to error or hacker bypass and requires the vendors of the virtual patch to reverse engineer (or guess!) what Oracle has fixed; then work out how that fix could be exploited and then how an exploit that could hack the database software can be detected.As I stated above Oracle do not release details of what is fixed so this virtual patching is not perfect and involves a lot of work. Yes, I can see that a product such as this maybe be a vert short term barrier to when a patch of a particular system cannot be applied quickly but its not a perfect fix.

So at first, the idea seems to be around much longer than I thought. It is nothing new.

But is a “virtual patch” now a real patch?

 

This is complete nonsense

I’m shocked – and scared. Seriously.

There is absolutely NO patching in “virtual patching”.

Zero.

It is like putting my healing hands on your system and promising that it will be protected from now on. If you trust me, please send me a DM, and in reverse I will send you the number of my secret Swiss bank account (which does not exist yet). I wonder how many systems I could “protect” in parallel. I have just two hands unfortunately, but since the patching is “virtual”, my hands could protect your systems “virtually” as well. I should call it “Mike’s Magic Virtual Patching (MVP)” and have a price list attached. [Be aware: this paragraph my contain serious pieces of sarcasm and irony]

At 10:50h on Monday morning, I’m still venting. I really saw and read a lot.

But credible customers with large infrastructures, business critical environments – putting their bets on a broken promise called “virtual patching“?

Let me explain why this is complete nonsense. And if you don’t trust me, please read Pete Finnigan’s blog post again.

The idea of this broken promise is that an external person having no access to the Oracle code would be able to setup up a surrounding protection fence for an Oracle database environment, like a firewall. And maybe it includes also reverse engineering of security patches. Which by the way – in my understanding – would be a violation of license agreements. I just can’t foresee what would happen in terms of an audit.

But even worse, a security patch often isn’t just a new version of a PL/SQL package, or a removed GRANT. It is often a code fix as well. And you’d trust a piece of software erected by somebody who has no code access promising that this will protect your environment?

Good luck with that.

 

There is no way around security patching

I’m not sure how often I repeated this truth in the past weeks to customers, especially to those who think that they can stay on Oracle 11g for the next years.

You must patch your environments on a regular basis. The fact that your current release may not be mentioned anymore in the risk matrix associated with the quarterly patch bundles just means that the release is not under bug fixing support anymore. But of course it doesn’t mean that your release may not be affected.

The reverse usually is true.

Patching most of my environments with the July 2022 Bundle Patches

Oracle Database risk matrix – July 2022 – see: https://www.oracle.com/security-alerts/cpujul2022.html#AppendixDB

See the rightmost column. The reason why 10g, 11g, 12.2.0.1 and 18c are not listed is NOT that these releases may not be affected. It is simply that none of it is under any sort of regular bug fixing support anymore.

You should always keep in mind that at the day Oracle publishes security fixes, the information about the issue itself may circulate somewhere already when the issue had been found by an external person. Internally we find security issues as well, and fix them as quickly as possible.

 

Patch quarterly to protect your environments

We all know what can happen if you don’t patch on a regular basis, especially for security reasons. Since we all are in IT, each of us knows numerous examples of missed and postponed patching sessions, and the disastrous results. I could name a few as well, at least one which caused a multi-billion dollar damage where somebody refused to upgrade the 9i databases for years.

And one of the most impacting ones even made it into Larry Ellison’s keynote at OOW 2017: Equifax.

I cut out the important scenes – so please take these 5 minutes and listen carefully:

For the complete keynote video please see this link.

I think there is nothing more to add here.

Do you think “virtual patching” will protect you against such incidents?

If you trust a myth called “virtual patching“, you also believe in fairy tales, unicorns and my magically healing hands.

There is NO patching in “virtual patching“.
Absolutely ZERO.

Virtual Patching is clearly the biggest nonsense I’ve ever heard about – for a long time.

 

Further Links and Information

–Mike

Share this: