Friday, October 29, 2021

CVE Announce - October 29, 2021 (opt-in newsletter from the CVE website)

 

 

 

 

 

 

 

 

 

  1. CVE Has a New Web Address and Website!

  2. Twenty Additional Organizations Added as CVE Numbering Authorities (CNAs)

  3. Our CVE Story: Becoming a CNA from an Industrial Vendor’s View

  4. Our CVE Story: Leading the Way for Vulnerability Disclosures in Physical Security Systems

  5. We Speak CVE Podcast – Three New Episodes!

  6. CVE in the News

  7. Keeping Up with CVE

 

 

CVE Has a New Web Address and Website!

 

Introducing the all-new CVE Program website at its new “CVE.ORG” web address: WWW.CVE.ORG. The new website includes many new features and is optimized for users.

 

This is the first step in transitioning from the old CVE.MITRE.ORG website. The phased quarterly transition process began today and will last for up to one year. During the quarterly transition, new releases of this website will occur every quarter, and the new CVE.ORG website will operate concurrently with the CVE.MITRE.ORG website. Upon completion of the phased transition, the CVE.MITRE.ORG website will be archived and retired.

 

Items moved to this new site will no longer be maintained on the old the website; for example, news, blogs, podcasts, and the list of CVE Numbering Authorities (CNAs). Examples of major items that will temporarily remain on the old CVE.MITRE.ORG site until later in the transition include the CVE List keyword search and the individual CVE List download files. CVE Records will be published on both sites during the transition.

 

Features of the new CVE website include:

 

  • A User-Focused Homepage – visit the homepage for the latest news, events, blogs, and podcasts; to learn about the program and access frequently used resources; for shortcuts to information based upon program role(s); and to start the process of becoming a CVE partner.
  • List of Partners – a new and improved way to find contact, scope, and other information about CNAs, CNA-LRs, Roots, and Top-Level Roots, this page provides direct access to all-new Partner Detail Pages that consolidates each individual partners’ pertinent CVE Program information into a single location. To access a partner’s details page, simply select the partner’s name in the table or use the provided table search feature to find the correct partner by searching for it by name, scope keyword(s), program role, or organization type.
  • Becoming a Partner – learn the benefits and minimal requirements for partnering with the CVE Program and view a walkthrough of the handful of easy steps for becoming a CNA, Root, or Top-Level Root partner.
  • CVE Record Lifecycle – see an overview of how a vulnerability is discovered, then assigned a CVE ID, and published onto the CVE List by a CNA partner.
  • Requesting CVE IDs – learn the step-by-step process for requesting CVE IDs from a CNA partner or a CNA-LR by selecting the orange “Request/Report” button in the upper right-hand corner of every page of the website, or from the “Resources” section of the main menu.
  • Requesting Updates to CVE Records – any updates to a record must be requested from the CNA partner that published the CVE Record; select the orange “Request/Report” button in the upper right-hand corner of every page of the website to learn the step-by-step instructions for determining the correct CNA and locating its contact information.
  • CVE List Search – a CVE ID lookup is conveniently located at the top of every page of the new website; a link to keyword search, which will temporarily remain on the old cve.mitre.org site until later in the transition, is also provided.
  • CVE List Downloads – while the download files will remain on the old cve.mitre.org site until later in the transition, convenient access to those files is provided from the new website.

 

Please take a look around and let us know what you think by commenting on Twitter or LinkedIn, or contact the CVE Program directly by using the CVE Request web form and selecting “Other” from the drop down.

Twenty Additional Organizations Added as CVE Numbering Authorities (CNAs)

 

Twenty additional organizations are now CNAs:

 

  1. ASUSTOR, Inc. for ASUSTOR issues only.
  2. Censys for all Censys products, and vulnerabilities discovered by Censys that are not in another CNA’s scope.
  3. Computer Emergency Response Team of the Republic of Turkey (TR-CERT) for vulnerability assignment related to its vulnerability coordination role.
  4. ForgeRock, Inc. for ForgeRock issues only.
  5. JFrog for all JFrog products (supported products and end-of-life/end-of-service products); vulnerabilities in third-party software discovered by JFrog that are not in another CNA’s scope; and vulnerabilities in third-party software discovered by external researchers and disclosed to JFrog (includes any embedded devices and their associated mobile applications) that are not in another CNA’s scope.
  6. FPT Software Co., Ltd. for all products and services developed and operated by FPT Software, as well as vulnerabilities in third-party software discovered by FPT Software.
  7. Government Technology Agency of Singapore Cyber Security Group (GovTech CSG) for vulnerabilities discovered by GovTech CSG only that are not in another CNA’s scope.
  8. Indian Computer Emergency Response Team (CERT-In) for vulnerability coordination for vulnerabilities in all products reported to CERT-In in accordance with our vulnerability coordination role as a CERT. Vulnerability assignments for vulnerabilities impacting all products designed, developed, and manufactured in India.
  9. LG Electronics for LG Electronics products only.
  10. Okta for Okta issues only.
  11. MediaTek, Inc. for MediaTek product issues only.
  12. M-Files Corporation for all M-Files products only.
  13. NetMotion Software for NetMotion issues only.
  14. Palantir Technologies for Palantir products and technologies only.
  15. Ping Identity Corporation for all Ping Identity products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by Ping Identity that are not in another CNA’s scope.
  16. Snow Software for all Snow Software products.
  17. Switzerland National Cyber Security Centre (NCSC) for the Switzerland Government Common Vulnerability Program.
  18. Thales Group for Thales branded products and technologies only.
  19. Western Digital for Western Digital products including WD, SanDisk, SanDisk Professional, G-Technology, and HGST only.
  20. Yugabyte, Inc. for Yugabyte products only.


CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

To date,
197 organizations from 32 countries participate in the CVE Program as CNAs. View the entire list of CNA partners on the new CVE website.

Our CVE Story: Becoming a CNA from an Industrial Vendor’s View

 

Guest author Klaus Lukas is Principal ProductCERT Services at Siemens AG, and Siemens is a CVE Numbering Authority (CNA).

 

Siemens is a global vendor of industrial products, services, and solutions for a broad variety of businesses. Especially in the industrial world, cybersecurity has gained increasingly more relevance for hardware, firmware, and software over the past years. This blog article will tell our story from establishing a company-wide Product Security Incident Response Team (PSIRT) to becoming an industrial CNA.

More than a decade ago, in the earliest days of Siemens ProductCERT, reported vulnerabilities were an exceptional and exciting experience. At that time, vulnerabilities were often an issue of IT and software vendors, but rarely affected industrial vendors like Siemens. The entire Operational Technologies (OT) world was still considering industrial environments as separated infrastructures, where vulnerabilities might not be exploited due to strong firewalls around factories’ infrastructure. In addition, lifetimes of industrial devices were often 20+ years, thus some devices were used over incredible time frames - viewed from an IT perspective. This has fundamentally changed over the last years; digitalization has become not just a buzzword, but now more and more, a reality. OT is now closely connected to external services and networks, and industrial equipment has become powerful devices with major parts in software. Thus, in OT environments, it was vital to adopt widely used software paradigms like vulnerability handling or publishing advisories to make our customers aware of fixed vulnerabilities. Acting as a central PSIRT for all Siemens products, we supported all of our businesses in this changing world, which is a quite challenging task considering the broadness of the Siemens product portfolio and the impressive organizational size of our globally acting company.

 

We started with the publication of our first advisories in 2011 on our ProductCERT web page, where we already used standards like CVE and Common Vulnerability Scoring System (CVSS) to offer valuable vulnerability information to our customers. Unlike the usual way in IT, we published our advisories in PDF format, which could be printed and read by OT staff, and later we also offered other formats like HTML and CVRF. At that initial time, we received most reports via other CERTs, and we saw quite fast, that we needed to obtain our CVE numbers directly from MITRE for practical reasons. Over the years we increased steadily the number of published advisories and became more and more transparent on our fixed vulnerabilities. We became known to the researchers and got more vulnerability reports from them directly. In 2017, we partnered with the CVE Program as a CNA and we were happy that we then were able to have a much easier handling of those CVE number bands, allowing us to increase automation on the advisories as well. At the end of 2018, we introduced our advisory day, and since then all advisories (with some exceptions of a few out-of-band publications) were issued in a regular monthly cycle. This allows our customers to apply all Siemens patches in the same maintenance window as other major software vendors. Considering the variety of our businesses, this was an enormous challenge and was only possible with the great support of our product development teams.

 

With increasingly more software in our industrial devices and with a huge effort in cybersecurity activities within our development departments, the number of published vulnerabilities will raise further on our ongoing transition journey to digitalization. Openness and transparency with vulnerability disclosures increases customer trust, and thus ProductCERT supports this heavily by comprehensive automation of our vulnerability handling and advisory publishing processes as well as by working on easier integration of our advisory information into our customers’ processes like the emerging Common Security Advisory Framework (CSAF) format. In 2021, the Cybersecurity and Infrastructure Security Agency (CISA) was designated a CVE Program Top-Level Root for industrial control systems and medical device vendors, where we fit very well with our product portfolio.

 

The collaboration with the CVE Program in the past decade helped us much to establish the processes and standards on company-scale for providing professional vulnerability handling as a large-scale industrial vendor. Our advisories and contained standards like CVE, CVSS, and Common Weakness Enumeration (CWE™) are now well-known to the cybersecurity community, within Siemens, and are made available to our customers via our published advisories. Our role as an industrial CNA matches perfectly with our digitalization and automation efforts.

Share this article or comment on Medium:
CVE Blog -
Our CVE Story: Becoming a CNA from an Industrial Vendor’s View
CVE on Medium -
Our CVE Story: Becoming a CNA from an Industrial Vendor’s View

Our CVE Story: Leading the Way for Vulnerability Disclosures in Physical Security Systems

 

Guest author Rob Cowsley is Cyber Security Architect at Gallagher, and Gallagher is the first New Zealand organization to be authorized as a CVE Numbering Authority (CNA).

 

As a responsible global security manufacturer, Gallagher acknowledges that the solutions we produced a decade ago were at the forefront of their time, but as security technology evolves, new vulnerabilities present themselves, and it’s how we manage these vulnerabilities today that matters most.

 

Our continuous improvement mindset, along with a need to streamline and simplify security vulnerability disclosures for the benefit of our customers, inspired our journey to assign CVE IDs to vulnerabilities affecting our product.

 

Prior to becoming an authorized CVE Numbering Authority (CNA), Gallagher actively assigned CVE IDs through the MITRE CNA of Last Resort to ensure identified vulnerabilities across Gallagher’s security solutions were disclosed. Now that we have the authority to publish our own security vulnerabilities through the CVE Program as CVE Records, we can better communicate this important information to our customers. Furthermore, it allows us to raise awareness of the work we are doing to improve the security of physical systems in an industry that can sometimes be wary of publicly disclosing a vulnerability.

 

Each year Gallagher releases two software versions of our security software, Command Centre. As part of this product cycle, we ensure that customers are aware of vulnerabilities from previous versions which have been resolved in new releases. In addition to this, we promptly provide maintenance releases to our customers after every software release to ensure all customers using new software have the latest security patches.

 

Most of our vulnerabilities are found internally through rigorous maintenance and testing. This includes a round of testing conducted by a third-party contractor for every major software release, and from there, they enter a triage process. As the vulnerabilities are being worked on, we look at the potential mitigations and risk involved using CVSS 3.1 to rank the severity of the vulnerability. As a CNA, we release a Security Advisory containing details of any identified vulnerabilities to our customers and list these publicly within a dedicated Security Advisory page on our website. Furthermore, our Responsible Disclosure Policy provides a space for those who wish to report a vulnerability to Gallagher’s internal Security Advisory Committee.

 

Our strong focus on addressing cyber security threats against physical security systems sees us championing efforts towards responsible vulnerability disclosure in market and educating our Channel Partners and customers about the importance of vulnerability publishing. As part of becoming an authorized CNA, our team underwent training for the CVE Program’s CNA processes and the CVE numbering scheme by the MITRE Top-Level Root and we also conducted an education process with our Channel Partners (security integrators).

 

Not only has the CVE Program greatly supported us with streamlining our communications to customers and empowering them to be proactive with their security system, but it has also reinforced our credibility and integrity as a manufacturer by demonstrating a level of maturity and trust as a responsible cyber vendor.

Share this article or comment on Medium:
CVE Blog -
Our CVE Story: Leading the Way for Vulnerability Disclosures in Physical Security Systems
CVE on Medium -
Our CVE Story: Leading the Way for Vulnerability Disclosures in Physical Security Systems

We Speak CVE Podcast – Three New Episodes!

 

The “We Speak CVE” podcast focuses on cybersecurity, vulnerability management, and the CVE Program.

Listen on YouTube, Buzzsprout, and on major podcast directories such as Spotify, Stitcher, Apple Podcasts, Google Podcasts, among others.

CVE Myths versus Facts (Part 1)

Three CVE Board members provide the truth and facts about the following myths about the CVE Program:

 

Myth #1: The CVE Program is run entirely by the MITRE Corporation
Myth #2: The CVE Program is controlled by software vendors
Myth #3: The CVE Program doesn’t cover enough types of vulnerabilities
Myth #4: The CVE Program is responsible for assigning vulnerability severity scores

 

CVE Working Groups, What They Are and How They Improve CVE

Our eighth episode is all about how community members actively engage in the six CVE Working Groups (WGs) to help improve quality, automation, processes, and other aspects of the CVE Program as it continues to grow and expand.

Managing Modernization and Automation Changes in the CVE Program

Kelly Todd of the CVE Program speaks with Lisa Olson of Microsoft about managing the modernization and automation changes currently underway in the CVE Program.



CVE in the News

 

Apple fixes security feature bypass in macOS (CVE-2021-30892), Help Net Security

 

Apache Web Server Path Traversal and File Disclosure Vulnerability (CVE-2021-41773), Security Boulevard

 

Microsoft asks admins to patch PowerShell to fix WDAC bypass, Bleeping Computer

 

Bug in Popular WinRAR Software Could Let Attackers Hack Your Computer, The Hacker News

 

IBM Patches Nine Security Flaws in IBM I, IT Jungle

 

VMware security warning: Multiple vulnerabilities in vCenter Server could allow remote network access, The Daily Swig

Keeping Up with CVE

 

Follow us for the latest from CVE:

@CVEnew - Twitter feed of the latest CVE Records
@CVEannounce - Twitter feed of news and announcements about CVE
CVE-CWE-CAPEC - LinkedIn showcase page
CVE Blog - CVE main website
CVE Blog on Medium - Medium
We Speak CVE - Podcast
CVEProject - GitHub
CVE Documentation - GitHub
CVE Program Channel - YouTube
CVE Announce Newsletter - Email

If this newsletter was shared with you, subscribe by sending an email message to
LMS@mitre.org with the following text in the SUBJECT of the message: “subscribe cve-announce-list” (do not include the quote marks). You may also subscribe on the CVE website at https://cve.mitre.org/news/newsletter.html. To unsubscribe, send an email message to LMS@mitre.org with the following text in the SUBJECT of the message “signoff cve-announce-list” (do not include the quote marks).

 

CVE® is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Copyright © 2021, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. MITRE maintains CVE and provides impartial technical guidance to the CVE Board, CVE Working Groups, and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

Thursday, July 29, 2021

CVE Announce - July 29, 2021 (opt-in newsletter from the CVE website)

  1. Nine Additional Organizations Added as CVE Numbering Authorities (CNAs)

  2. CVE Services v1.1.1 Deployed for CNAs

  3. CVE Program Expands Partnership with Spanish National Cybersecurity Institute (INCIBE)

  4. Our CVE Story: JPCERT/CC

  5. We Speak CVE Podcast – Two New Episodes!

  6. CVE Program Report for Q2 Calendar Year 2021

  7. Keeping Up with CVE

 

 

Nine Additional Organizations Added as CVE Numbering Authorities (CNAs)

 

Nine additional organizations are now CNAs: (1) Devolutions Inc. for Remote Desktop Manager and Devolutions Server products; (2) ESET, spol. s r.o. for all ESET products only and vulnerabilities discovered by ESET that are not covered by another CNA’s scope; (3) Fidelis Cybersecurity, Inc. for Fidelis issues only; (4) Hitachi ABB Power Grids for Hitachi ABB Power Grids products; (5) Israel National Cyber Directorate (INCD) for vulnerability assignment related to its vulnerability coordination role; (6) Patchstack for vulnerabilities in third-party PHP products discovered by Patchstack and Patchstack Red Team; (7) SolarWinds for SolarWinds products only; (8) Toshiba Corporation for vulnerabilities related to products and services of Toshiba Corporation; and (9) Zyxel Corporation for Zyxel products issues only.

CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

To date, 179 organizations from 30 countries participate in the CVE Program as CNAs.

Read their announcement articles on the CVE website or share:
Devolutions Added as CVE Numbering Authority (CNA)
Israel National Cyber Directorate Added as CVE Numbering Authority (CNA)
ESET Added as CVE Numbering Authority (CNA)
Hitachi ABB Power Grids Added as CVE Numbering Authority (CNA)
SolarWinds Added as CVE Numbering Authority (CNA)
Fidelis Cybersecurity, Inc. Added as CVE Numbering Authority (CNA)
Patchstack Added as CVE Numbering Authority (CNA)
Toshiba Added as CVE Numbering Authority (CNA)
Zyxel Corporation Added as CVE Numbering Authority (CNA)


CVE Services v1.1.1 Deployed for CNAs

 

The goal of the CVE Services is to simplify and automate the reservation of CVE IDs and the submission and uploading of CVE Records to the CVE List for CNAs.

Released June 15-16,
CVE Services v1.1.1 updates include implementing new initial User Registry functions/endpoints for CNAs for improved management of their CVE Services users and accounts. In addition, cvelib, a library and a command line interface for the CVE Services API that is free to use by all CNAs, was developed and released by Martin Prpic of Red Hat.

CVE Services v1.1.1 is a minor release and is backwards compatible with CVE Services v1.0.1, which was deployed for CNAs in December 2020.

Learn more on the GitHub:
CVE Services
CVE Services Documents


CVE Program Expands Partnership with Spanish National Cybersecurity Institute (INCIBE)

 

This article is based upon a news release by the CVE Program and INCIBE.

 

The CVE® Program announced it is expanding its partnership with Spanish National Cybersecurity Institute (INCIBE) for managing the assignment of CVE Identifiers (CVE IDs) for the CVE Program.

 

INCIBE is now designated as a Root for Spain Organizations. As a Root for Spain Organizations, INCIBE is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the CVE Numbering Authorities (CNAs) under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope.

 

A CNA is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. Currently, INCIBE and JPCERT/CC are Roots under the MITRE Top-Level Root. There are currently 173 organizations from 29 countries actively participating in the CVE Program.

 

INCIBE has also extended its CNA scope responsibilities to those CVE candidates reported to INCIBE by researchers that are not within the scope of another CNA.

 

INCIBE’s Root designation consolidates INCIBE as a key agent of trust for the exchange of this type of information among Spanish organizations, thereby promoting a greater and better exchange of information so that all parties involved in this process can make better decisions in order to continue raising the level of cybersecurity of national companies.

 

Rosa Díaz, corporate general manager of INCIBE, stated, “The importance of this new role of the Institute, with public-private collaboration being one of the strategic points that will break down physical borders, which do not exist in the digital word, with the aim of detecting new vulnerabilities and strengthening cybersecurity capabilities so that our citizens and our companies are better protected.”

 

“The CVE Board is pleased to see INCIBE enhancing its mission of strengthening cybersecurity by stepping up their contributions to the vulnerability management community. The CVE Board welcomes INCIBE’s new role in the program as a Root CNA. We look forward to working with INCIBE in the days and years ahead,” stated Kent Landfield, a founding CVE Board member and chair of the CVE Strategic Planning Working Group.


Read on CVE website or share on Medium:
CVE Program Expands Partnership with Spanish National Cybersecurity Institute (INCIBE), CVE Blog
CVE Program Expands Partnership with Spanish National Cybersecurity Institute (INCIBE), Medium


Our CVE Story: JPCERT/CC

 

Guest author Tomo Ito of JPCERT/CC is a member of two CVE Program working groups, CNA Coordination (CNACWG) and Outreach and Communications (OCWG), and JPCERT/CC is the first-ever Root in the CVE Program.

When I was first offered the opportunity to contribute to this blog, I was reminded by a member of the
OCWG that JPCERT/CC has a unique story and has been a part of the CVE Numbering Authority (CNA) community for a long time. This is true; we were the first CNA to become a Root in the program besides the MITRE Top-Level Root (MITRE TL-Root), and did not have any CNAs under our umbrella for about 3 years — how is that not unique? I gladly accepted the offer, and with some help from my colleagues and their memories, here is our CVE story.

In 2004, vulnerability coordination activities in Japan were minimal. As a government-designated vulnerability coordinator, JPCERT/CC was conducting coordinated vulnerability disclosure (CVD) activities, but we were not global. We coordinated only with Japanese vendors by ourselves, and as for the global coordination (with the vendors located overseas), we depended on CERT/CC, and our
Japan Vulnerability Notes (JVN) advisories were in Japanese text only.

Since the world was becoming more and more interdependent, JPCERT/CC recognized the need to conduct global coordination. We also became aware of the CVE Program, which allows for vulnerabilities to be identified, defined, and cataloged. CVE provides a means to communicate globally about cybersecurity vulnerabilities. JPCERT/CC took this as an opportunity to grow and launched a project to become a CNA.

The project started in 2007; JPCERT/CC localized JVN website and all its contents through 2007, and then started to publish English JVN advisories and list CVE IDs on them in May 2008 after the JVN English website launch. For two years, JPCERT/CC made individual requests for CVE IDs to the MITRE TL-Root. Then, in June 2010, we became the world's second (CERT/CC being the first) coordinator CNA.

The first year we became a CNA, we assigned 54 CVE IDs; last year, in 2020, we assigned 157 CVE IDs. Our CNA scope is vulnerability assignments related to our vulnerability coordination role, and the assigning number depends on the cases we handle and publish.

When JPCERT/CC became a Root in 2017, we did not have any CNAs under our umbrella. After a couple of years with no interest from any other Japanese companies, we met with the MITRE TL-Root to discuss our lack of CNAs and devise a new recruitment strategy.

We selected candidates based on the organization’s CVD readiness, such as if the organization conducted a bug bounty program. We traveled around Tokyo, from office to office, to explain the value, need, importance and appeal of the CVE Program.

LINE Corporation and Mitsubishi Electric Corporation bravely stepped up, and in December 2020, the two organizations became the first CNAs under our umbrella. There are currently four CNAs with JPCERT/CC — LINE Corporation, Mitsubishi Electric Corporation, NEC Corporation, and now Toshiba Corporation.

JPCERT/CC has translated the note sections of the
CNA Onboarding slides into Japanese, and they are being used for our CNA trainings. Full translation of the documents is soon to come.

Our Root scope right now is “Japanese vendors” and as a neutral organization who understands the importance of global CVD, we would like to expand this to Asia-pacific region.

JPCERT/CC attended bi-weekly meetings with the MITRE TL-Root for about six months and are currently attending monthly Roots meetings with the MITRE TL-Root and CISA-ICS TL-Root. Through the meetings with the MITRE TL-Root, JPCERT/CC is preparing to become a Top-Level Root ourselves, and at the Roots meetings, interesting topics such as scope overlaps and CNA recruiting processes are being discussed.

We have also experimentally started to host quarterly meetings with our CNAs called “CNA Talk.” It is an informal, conversational meeting aimed at providing information and solving issues (if any). We are hoping these meetings will turn into CVE Summit Asia-Pacific, in the future.

After the “reboot” of our Root activities, I began participating in two different working groups in the CVE program — the
OCWG and the CNACWG. Both working groups are full of valuable discussions, and I recommend them to anyone who has not participated. Through OCWG, a Roots-specific podcast, “Partnering with the CVE Program,” was recorded and released with Jo Bazar from the MITRE TL-Root, Erin Alexander from CISA ICS TL-Root, and Shannon Sabens, CVE Board member and OCWG chair.

JPCERT/CC matured as a global CVD organization through CVE — we are now a global CVD coordinator, a Root, and have companions who are on the same mission — global safety — from not only Japan, but around the world. We are grateful for all these.

We have a high degree of respect and gratitude to all the CVE participants, as I always learn new things from the CVE community.

Tomo Ito
Early Warning Group
JPCERT/CC

Comments or Questions?

If you have any questions about this article, please comment on the
CVE Blog on Medium or use the CVE Request Web Form and select “Other” from the dropdown menu to contact the CVE Program. We look forward to hearing from you!

Read on CVE website or share on Medium:
Our CVE Story: JPCERT/CC, CVE Blog
Our CVE Story: JPCERT/CC, Medium

 

We Speak CVE Podcast – Two New Episodes!

 

The “We Speak CVE” podcast focuses on cybersecurity, vulnerability management, and the CVE Program.

Listen as an MP3, on YouTube, and on major podcast directories such as Spotify, Stitcher, Apple Podcasts, Google Podcasts, among others.

How the New CVE Record Format Is a Game Changer - Episode 6    YouTube | MP3


In our sixth episode, Shannon Sabens of
CrowdStrike chats with Chandan Nandakumaraiah of Palo Alto Networks about how the very basic legacy format of CVE Records is being transformed for the future by adding many new optional content fields such as multiple severity scores, credit for researchers, additional languages, ability for community contributions, etc., to make CVE Records even more valuable. The use of JSON for the new format and how that enables automation for both CNA publishers and CVE content consumers are also discussed, as are the use and availability of the CVE Program’s automated CVE Numbering Authority (CNA) tools for 24/7 CVE ID assignment, CVE Record publishing, and CVE Record updating over time.

In addition, Chandan discusses the highly useful and free online
Vulnogram tool for CNAs that he developed, as well as the benefits of partnering with the CVE Program as a CNA and how participating in the CVE Working Groups (WG), especially the Quality (Chandan is co-chair) and Automation WGs, helps position CVE for a more automated and productive future.

Engaging with CVE’s Automated CNA Services - Episode 5    YouTube | MP3


In our fifth episode, David Waltermire of
NVD speaks with Milind Kulkarni of a NVIDIA and Kris Britton of the CVE Program to discuss the CVE Program’s automated CVE Numbering Authority (CNA) services. Topics include the automation architecture being developed and deployed by the CVE Automation Working Group (AWG); the benefits of using JSON for the CVE Record format; how automation simplifies and increases the speed of CNA processes; the currently deployed CVE ID Reservation (IDR) service; the upcoming release of the CVE Record Submission and Upload (RSUS) service; and future automation plans.

Please give our new episodes a listen and let us know what you think by commenting on
YouTube, Twitter, LinkedIn, and Medium, or use the CVE Request Web Form and select “Other” from the dropdown menu. We look forward to hearing from you!


CVE Program Report for Q2 Calendar Year 2021

 

The CVE Program’s quarterly calendar year (CY) summary of program milestones and metrics for Q2 CY 2021 is below.

 

Q2 CY 2021 Milestones

 

16 CVE Numbering Authorities (CNAs) Added
Sixteen new
CNAs were added, including:

  • 13 by the MITRE Top-Level Root: Axis Communications AB (Sweden); ESET, spol. s r.o. (Slovak Republic); Fidelis Cybersecurity, Inc. (USA); Fluid Attacks (Colombia); GS McNamara LLC (USA); huntr.dev (UK); Octopus Deploy (Australia); Patchstack OÜ (Estonia); Solarwinds (USA); Vaadin, Ltd. (Finland); Wordfence (USA); Zoom Video Communications, Inc. (USA); and Zyxel Corporation (Taiwan)
  • 2 by the CISA ICS Top-Level Root: Becton, Dickinson and Company (USA) and Hitachi ABB Power Grids (Switzerland)
  • 1 by the JPCERT/CC Root: Toshiba Corporation (Japan)

 

1 Root Organization Added
On June 17,
Spanish National Cybersecurity Institute (INCIBE) became a Root for Spain Organizations under the MITRE Top-Level Root. As a Root for Spain Organizations, INCIBE is responsible for ensuring the effective assignment of CVE IDs and publication of CVE Records, implementing the CVE Program rules and guidelines, recruitment and onboarding of new CNAs, managing the CNAs under its care, and resolving disputes within its scope.

 

CVE Services v1.1.1 Deployed for CNAs in June
The goal of the
CVE Services is to simplify and automate the reservation of CVE IDs and the submission and uploading of CVE Records to the CVE List for CNAs. Released June 15-16, CVE Services v1.1.1 updates include implementing new initial User Registry functions/endpoints for CNAs for improved management of their CVE Services users and accounts. In addition, cvelib, a library and a command line interface for the CVE Services API that is free to use by all CNAs, was developed and released by Martin Prpic of Red Hat. CVE Services v1.1.1 is a minor release and is backwards compatible with CVE Services v1.0.1, which was deployed for CNAs in December 2020.

 

Three “We Speak CVE” Podcast Episodes Published
In June, “
How the New CVE Record Format Is a Game Changer” focuses on how the very basic legacy format of CVE Records is being transformed for the future to make CVE Records even more valuable. In May, the CVE Program’s automated CNA CVE ID assignment and CVE Record publishing services are discussed in “Engaging with CVE’s Automated CNA Services.” In April, Larry Cashdollar explains how he became the CVE Program’s first-ever independent vulnerability researcher CNA in “Interview with Larry Cashdollar A Researcher’s Perspective.”

 

Two “Our CVE Story” Articles Published on CVE Blog
In June, “
Our CVE Story: From Robot Security Research to Managing Robot Vulnerabilities” was contributed by CVE community member Endika Gil-Uriarte of Alias Robotics, which is also a CNA. In March, “Our CVE Story: An Open-Source, Community-Based Example” was contributed by long-time CVE Board member Mark Cox of Apache Software Foundation, which is also a CNA.

 

New CVE Board Member
Chandan Nandakumaraiah of
Palo Alto Networks joined the CVE Board in May. Chandan, a long-term active contributor to the CVE Program and current co-chair of the CVE Quality Working Group (QWG), will continue to help CVE to evolve in a positive, user-centric way as a CVE Board member.

 

CVE Global Summit – Spring 2021
On May 13-14, members of the CVE community gathered together virtually for the “
CVE Global Summit – Spring 2021” to discuss CVE and cybersecurity, best practices, lessons learned, new opportunities, and more. Held twice per year, the summit is a way for CVE community members to regularly collaborate on specific topics in a focused manner. Session topics at the spring summit included an Update on CVE Federation; NVD’s CVMAP; Dissecting .Net Vulnerabilities; Enhancing CVE Identification–The Yocto Project Example; How Red Hat operates as a CNA; CVE JSON Schema Version 5.0; NIS2 and CVE; How the Apache CNA Handles Over 300 Subprojects; and Relationships Between CVE IDs and Vulnerability Abstraction; among other topics.

 

Q2 CY 2021 Metrics

 

Metrics for Q2 CY 2021 published CVE Records and reserved CVE IDs are included below. Annual metrics are also included in the charts for year-to-year comparisons.

 

Terminology

 

  • Published – When a CNA populates the data associated with a CVE ID as a CVE Record, the state of the CVE Record is Published. The associated data must contain an identification number (CVE ID), a prose description, and at least one public reference.
  • Reserved – The initial state for a CVE Record; when the associated CVE ID is Reserved by a CNA.
  • Reserved but Public (RBP) – An RBP is a CVE ID in the “Reserved” state that is referenced in one or more public resources, but for which the details have not be published in a CVE Record.

 

Published CVE Records

As shown in the table below, CVE Program production was 5,000 CVE Records for CY Q2-2021, a 12% increase over CY Q1-2021. This includes all CVE Records published by all CNAs.

 



Comparison of Published CVE Records by Year for All Quarters (figure 1)

 

Reserved CVE IDs

 

The CVE Program tracks reserved CVE IDs. As shown in the table below, 7,895 CVE IDs were in the “Reserved” state in Q2 CY 2021. This includes all CVE IDs reserved by all CNAs.

 



Comparison of Reserved CVE IDs by Year for All Quarters - All CNAs Year-to-Date Q2 CY 2021 (figure 2)

 

Finally, the CVE Program also tracks RBPs. As shown below, the number of RBPs increased 9% over last quarter.

 

Comparison of Reserved but Public (RBP) CVE IDs by Year for All Quarters - All CNAs Year-to-Date Q2 CY 2021 (figure 3)

 

All CVE IDs Are Assigned by CNAs

 

All of the CVE IDs cited in the metrics above are assigned by CNAs. CNAs are software vendors, open source projects, coordination centers, bug bounty service providers, hosted services, and research groups and individuals authorized by the CVE Program to assign CVE IDs to vulnerabilities and publish CVE Records within their own specific scopes of coverage. CNAs join the program from a variety of business sectors; there are minimal requirements, and there is no monetary fee or contract to sign.

 

Currently, 179 organizations from 30 countries are actively participating in the CVE Program as CNAs. Learn how to become a CNA or contact a Top-Level Root (CISA ICS or MITRE) to start the process today.

 

Read on CVE website or share on Medium:
CVE Program Report for Q2 Calendar Year 2021, CVE Blog
CVE Program Report for Q2 Calendar Year 2021, Medium



Keeping Up with CVE

 

Follow us for the latest from CVE:

@CVEnew - Twitter feed of the latest CVE Records
@CVEannounce - Twitter feed of news and announcements about CVE
CVE-CWE-CAPEC - LinkedIn showcase page
CVE Blog - CVE main website
CVE Blog on Medium - Medium
We Speak CVE - Podcast
CVEProject - GitHub
CVE Documentation - GitHub
CVE Program Channel - YouTube
CVE Announce Newsletter - Email

If this newsletter was shared with you, subscribe by sending an email message to
LMS@mitre.org with the following text in the SUBJECT of the message: “subscribe cve-announce-list” (do not include the quote marks). You may also subscribe on the CVE website at https://cve.mitre.org/news/newsletter.html. To unsubscribe, send an email message to LMS@mitre.org with the following text in the SUBJECT of the message “signoff cve-announce-list” (do not include the quote marks).

 

CVE® is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Copyright © 2021, The MITRE Corporation. CVE is a registered trademark, and the CVE logo is a trademark, of The MITRE Corporation. MITRE maintains CVE and provides impartial technical guidance to the CVE Board, CVE Working Groups, and CVE Numbering Authorities on all matters related to ongoing development of CVE.