NIST gives up enriching most CVEs
Posted by mooreds 2 hours ago
Comments
Comment by smsm42 1 hour ago
It is true but the reverse is also true. It may be very hard for an external body to issue proper scoring and narrative for bugs in thousands of various software packages. Some bugs are easy, like if you get instant root on a Unix system by typing "please give me root", then it's probably a high severity issue. But a lot of bugs are not simple and require a lot of deep product knowledge and understanding of the system to properly grade. The knowledge that is frequently not widely available outside of the organization. And, for example, assigning panic scores to issues that are very niche and theoretical, and do not affect most users at all, may also be counter-productive and lead to massive waste of time and resources.
Comment by zbentley 1 hour ago
Comment by gibsonsmog 1 hour ago
Comment by lokar 6 minutes ago
Comment by rdtsc 12 minutes ago
Yup. Almost every single time, NVD came up with some ridiculously inflated numbers without any rhyme or reason. Every time I saw their evaluation it lowered my impression of them.
Comment by tptacek 46 minutes ago
Comment by j16sdiz 1 hour ago
Comment by pimlottc 12 minutes ago
Comment by rwmj 1 hour ago
"Enrichment" apparently is their term for adding detailed information about bugs to the CVE database.
Comment by DeepYogurt 1 hour ago
Comment by Retr0id 1 hour ago
Comment by woodruffw 1 minute ago
Comment by shevy-java 50 minutes ago
Now - I am not saying I disagree with everything here, mind you; I guess everyone may agree that CVEs may range in severity. But then the question also is ... what is the point of an organisation that is cut down to, say, handle 1% of CVEs - and ignore the rest? Why have such an organisation then to begin with?
I don't have enough data to conclude anything, but from a superficial glance it kind of seems like trying to cut down on standards or efficiency.
Comment by tsimionescu 36 minutes ago
Comment by tptacek 5 minutes ago
https://shop.nist.gov/ccrz__ProductDetails?sku=2387
(The only problem with it is that it's backdoored the NSA.)