NIST gives up enriching most CVEs

168 points - yesterday at 3:09 PM

Source

Comments

smsm42 yesterday at 4:02 PM
> This opens the door for a lot of infosec drama. Some of the organizations that issue CVE numbers are also the makers of the "reported" software, and these companies are extremely likely to issue low severity scores and downplay their own bugs.

It is true but the reverse is also true. It may be very hard for an external body to issue proper scoring and narrative for bugs in thousands of various software packages. Some bugs are easy, like if you get instant root on a Unix system by typing "please give me root", then it's probably a high severity issue. But a lot of bugs are not simple and require a lot of deep product knowledge and understanding of the system to properly grade. The knowledge that is frequently not widely available outside of the organization. And, for example, assigning panic scores to issues that are very niche and theoretical, and do not affect most users at all, may also be counter-productive and lead to massive waste of time and resources.

strenholme yesterday at 6:54 PM
The deluge of new security reports is somewhat of a pain in the butt for those of us who have written notable open source software decades ago that is still in use. I recently got about a dozen reports from one reporter, and they look to be AI-assisted reports.

Long story short, the reports were things like “If your program gets this weird packet, it takes a little longer than usual to free resources”. There was one supposed “packet of death” report which I took seriously enough to spend an afternoon writing a test case for; I couldn’t reproduce the bug and the tester realized their test setup was broken.

There seems to be a lot of pressure for people to get status by claiming they broke some old open source project, to the point people like me are getting pulled out of retirement to look at issues which are trivial.

tptacek yesterday at 5:00 PM
The NVD was an absolutely wretched source of severity data for vulnerabilities and there is no meaningful impact to vendors/submitters supplying their own CVSS scores, other than that it continues the farce of CVSS in a reduced form, which is a missed opportunity.
rwmj yesterday at 3:52 PM
https://archive.ph/S8ajd

"Enrichment" apparently is their term for adding detailed information about bugs to the CVE database.

j16sdiz yesterday at 4:21 PM
TBH, I don't see much enrichment they are giving in last 5 or 6 years.
deckar01 yesterday at 7:39 PM
Mitre used to issue CVEs within 24 hours. I am going on 4 months now with no follow up, and no way to tell them GitHub issued a CVE already… I’m pretty sure they were just rubber stamping before. Considering disclosure normally should be coordinated with maintainers, 3rd parties like Mitre don’t seem to have much to offer or much to gain other than being a bottleneck.
dlor yesterday at 6:34 PM
Enriching does a few things, but the main ones are adding CVSS information and CPE information.

CVSS (risk) is already well handled by other sources, but CPE (what software is affected) is kind of critical. I don't even know how they're going to focus enrichment on software the government uses without knowing what software the CVEs are in.

khalic yesterday at 5:49 PM
I can’t help but draw a connection with the numerous budget cuts from this admin, including the almost-crisis from last year with NIST.
DeepYogurt yesterday at 3:51 PM
Long overdue to be honest.
RandomTeaParty yesterday at 6:11 PM
I was always wondering - are there alternative lists like this?

Maybe not in english or smth

pimlottc yesterday at 5:34 PM
What is the data that NIST is adding for enriched entries?
pojzon yesterday at 8:35 PM
Im close to Security MVP for EU parliment, listening on weekend bbq how stupid and pointless vast majority of CVEs are and how stupid and pointless majority of reports are - thank god someone wants to put an end to this.

Majority of researchers dont care how important the bug is, everyone wants something to put on CV, they get paid extra by companies to finding bugs in SAP or SalesForce that will never ever ever be used for anything.

Pointless moot just to generate noice. Like 90% of whole infosec sector.

At least thats what I understood from discussions with someone who has many nations security at stake at work.

lo_zamoyski yesterday at 8:21 PM
I can't parse this grammatically-tortured title.
shevy-java yesterday at 4:56 PM
> Going forward, NIST says its staff will only add data—in a process called enrichment—only for important vulnerabilities.

Now - I am not saying I disagree with everything here, mind you; I guess everyone may agree that CVEs may range in severity. But then the question also is ... what is the point of an organisation that is cut down to, say, handle 1% of CVEs - and ignore the rest? Why have such an organisation then to begin with?

I don't have enough data to conclude anything, but from a superficial glance it kind of seems like trying to cut down on standards or efficiency.

Retr0id yesterday at 4:34 PM
Maybe we should just assign UUIDs
jeremie_strand yesterday at 6:16 PM
[dead]