Skip to content

cisagov/vulnrichment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CISA Vulnrichment

The CISA Vulnrichment project is the public repository of CISA's enrichment of public CVE records through CISA's ADP (Authorized Data Publisher) container. In this phase of the project, CISA is assessing new and recent CVEs and adding key SSVC decision points. Once scored, some higher-risk CVEs will also receive enrichment of CWE, CVSS, and CPE data points, where possible.

Producers and consumers of this CVE data should already be familiar with the current CVE Record Format and can access this data in the normal ways, including the GitHub API.

How it works

First, CISA will take each CVE through an SSVC scoring process.

Next, for those CVEs that are rated as "Total Technical Impact," "Automatable," or have "Exploitation" values of "Proof of Concept" or "Active Exploitation," further analysis will be conducted. CISA will determine if there is enough information to assert a specific CWE identifier, a CVSS score, or a CPE string.

For those CVEs that do not already have these fields populated by the originating CNA, CISA will populate the associated ADP container with those values when there is enough supporting evidence to do so. In some cases, CISA may also add reference URLs. At no point will CISA overwrite the originating CNA's data in the original CNA container in the CVE record.

An example CVE

Take a look at CVE-2024-3931, which was fairly recently assigned, but otherwise chosen at random.

For this CVE, the CISA ADP starts on line 119. CISA has determined that a proof-of-concept exploit is available for this vulnerability, so that's noted on line 130. CISA has also enriched this CVE ID with a CPE string on line 147 , "cpe2.3:a:totara:enterprise_lms:*:*:*:*:*:*:*:*". However, since the originating CNA already provided CWE and CVSS data, CISA has not updated or copied those values into the ADP container.

A note about CPE

Of all the enriched data types, consistent and universal software identification, currently in the form of CPE, is the most difficult to accurately generate and maintain. CISA will assess and improve CPE enrichment as this project progresses. There are three sets of CPE data, all of which conform to the CPE Specification:

  1. The official NVD CPE Dictionary
  2. CPE entries that are present in NVD data but not in the Dictionary
  3. CPE entries created by CISA

Learn more

This project is expected to evolve quickly over the next several weeks, so please keep an eye on this README.md.

Issues and Pull Requests

We want to hear from you, the IT cybersecurity professional community, about our ADP enrichment! If you see something, please feel free to say something in the Issues, or even better, open a Pull Request with your suggested fix. Note that if you have an issue with the original CVE data, you are encouraged to take that issue up with the responsible CNA directly.

About

A repo to conduct vulnerability enrichment.

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published