-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make IMPACT an explicitly required component of CVE entries #41
Comments
[Manion 2017-07-11] |
Do we need a CWE like project for impact? I'm serious here, I looked around for systems ot rate impact, they basically don't exist. I consider this out of scope for CVE, but it might be something MITRE/others ned to look into. |
We have some aspects of impact defined in the NIST Vulntology. It may be useful to do some gap analysis based on what is there to figure out what should be added. IMHO, this is preferable to starting a new effort. |
First, why would we want impact to be required? Impact or a measurement of risk does not give information relevant to determining if a vulnerability exists or is unique. CVE is about naming the vulnerabilities, not interpreting their subjective effects on the world. Assuming impact is useful for determining uniqueness, though, impact is currently part of the JSON schema, and it includes CVSS as part of it. Without a standard or common language used around impact, making the field required at this time would lead to less-than-ideal results. I propose we put this issue on hold until a standard is identified that could be used. If the community feels this is important, we can develop that standard (or refine the relevant content in the Vulntology) and make it required during the next CNA Rules revisions cycle. Meanwhile, if a CVE submitter wants to include impact, they can do so via JSON. Ideally, since CVSS is there and is a standard, we will see an increased use of it by CNAs at the very least, which is another good thing for the greater community. |
Impact is used to determine if an issue is a vulnerability (CNT2.2). However, if the vendor says it is a vulnerability (CNT2.1), it is not required. |
@EvansJonathan I think we should require it as impact is a very useful piece of information to have to help categorize how bad the CVE is. |
@kseifriedredhat that is true. However, CVE's mission is to provide IDs to vulnerabilities, not inform people how bad the vulnerability is. That is why NIST generates the CVSS vector instead of MITRE. If we choose to make CVE the source for information like this, then we will be changing the mission of the CVE program. |
@EvansJonathan I'm not proposing that MITRE do the CVSS, I'm proposing that a CVE request requires impact info because we have far to many "unknown impact" CVEs that aren't super useful. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=%22unknown+impact%22 |
From Art Manion: |
Can we make it something like "IMPACT is required in either a separate IMPACT field or as part of the description even if it is unknown or not completely understood". I really want to minimize the number of "unknown impact entries", but I also get that there is no good standard/language taxonomy for describing this officially. |
GOAL: Better data in CVE database - IMPACT data
CHANGE: Make IMPACT an explicitly required component of the CVE unless it is truly not known. Ideally the information should be specific (e.g. "code execution") but if not a more general (AIC impact) should be provided.
OUTCOME: Less "unknown impact CVEs"
The text was updated successfully, but these errors were encountered: