NHacker Next
  • new
  • past
  • show
  • ask
  • show
  • jobs
  • submit
NIST gives up enriching most CVEs (risky.biz)
smsm42 37 minutes ago [-]
> This opens the door for a lot of infosec drama. Some of the organizations that issue CVE numbers are also the makers of the "reported" software, and these companies are extremely likely to issue low severity scores and downplay their own bugs.

It is true but the reverse is also true. It may be very hard for an external body to issue proper scoring and narrative for bugs in thousands of various software packages. Some bugs are easy, like if you get instant root on a Unix system by typing "please give me root", then it's probably a high severity issue. But a lot of bugs are not simple and require a lot of deep product knowledge and understanding of the system to properly grade. The knowledge that is frequently not widely available outside of the organization. And, for example, assigning panic scores to issues that are very niche and theoretical, and do not affect most users at all, may also be counter-productive and lead to massive waste of time and resources.

zbentley 9 minutes ago [-]
Very true. So many regulated/government security contexts use “critical” or “high” sev ratings as synonymous for “you can’t declare this unexploitable in context or write up a preexisting-mitigations blurb, you must take action and make the scanner stop detecting this”, which leads to really stupid prioritization and silliness.
j16sdiz 18 minutes ago [-]
TBH, I don't see much enrichment they are giving in last 5 or 6 years.
Retr0id 5 minutes ago [-]
Maybe we should just assign UUIDs
rwmj 47 minutes ago [-]
https://archive.ph/S8ajd

"Enrichment" apparently is their term for adding information to the CVE database.

DeepYogurt 48 minutes ago [-]
Long overdue to be honest.
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
Rendered at 16:39:26 GMT+0000 (Coordinated Universal Time) with Vercel.