-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need real examples of VEX based on actual products and known vulnerabilities, such as Log4J #832
Comments
@rjb4standards Thank you for reaching out. The TC is going to discuss this in the next TC meeting. Flagging @santosomar for attention |
Thank you Thomas, Please consider showing some VEX artifacts for products affected by Log4J as a real world example. This is a CVE we frequently use for testing and demonstration purposes. Thank you for your consideration. |
We (Cisco) didn't have VEX when Log4Shell (the famous log4j vulnerability was disclosed). However, we now have VEX via a tool called CVR and also traditional security advisories in CSAF: This is a real example of a VEX document for a Cisco product:
Red Hat has also VEX disclosures available at: https://security.access.redhat.com/data/csaf/v2/vex/ This is the Log4J real VEX doc from RedHat: https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-44228.json |
Thanks very much @santosomar |
Absolutely! 👍 m glad it helped. Cheers 🍻 |
Thanks Omar @santosomar |
@rjb4standards There is also one from Secvisogram in the repo: https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/examples/csaf/csaf_vex/sec-vex-2022-0001.json |
Thanks, Thomas @tschmidtb51 Also, FYI: NIST has renamed "Vulnerability Disclosure Report" (VDR) to "Vulnerability Advisory Report" (VAR) to be consistent with IEC 29147, effective November 1, 2024 in SP 800-161r1-upd1 and updated online guidance as well: https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity/software-security-supply-chains-software-1 "Ensure that third-party suppliers continuously enrich SBOM data with a VAR." |
The issue has been discussed in today's TC meeting and a Call to Action has been issued: https://groups.oasis-open.org/discussion/call-to-action-for-832 |
Please upload actual product VEX documents into the VEX examples repository, https://github.com/oasis-tcs/csaf/tree/master/csaf_2.1/examples/csaf/csaf_vex, for others to test against. The Log4J CVE would be a good example of real product impact, both affected and not affected status. Perhaps a VEX for Apache products that use Log4J would be good candidates for these examples.
The text was updated successfully, but these errors were encountered: