Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update description of Exploitation:PoC #353

Closed
ahouseholder opened this issue Oct 17, 2023 · 3 comments · Fixed by #442
Closed

Update description of Exploitation:PoC #353

ahouseholder opened this issue Oct 17, 2023 · 3 comments · Fixed by #442
Assignees
Labels
documentation Improvements or additions to documentation enhancement New feature or request
Milestone

Comments

@ahouseholder
Copy link
Contributor

ahouseholder commented Oct 17, 2023

Regarding

POC = SsvcDecisionPointValue(
name="PoC",
key="P",
description="One of the following cases is true: (1) private evidence of exploitation is attested but not shared; "
"(2) widespread hearsay attests to exploitation; (3) typical public PoC in places such as Metasploit"
" or ExploitDB; or (4) the vulnerability has a well-known method of exploitation.",
)

@j--- wrote:

Do we actually think (1) and (2) are operationalizable?
CISA's SSVC version of State of Exploitation removes them https://www.cisa.gov/sites/default/files/publications/cisa-ssvc-guide%20508c.pdf
Maybe we should move for consistency between instances of the decision point?

Originally posted by @j--- in #328 (comment)

Quoting the CISA doc referenced above:

(State of) Exploitation
Evidence of Active Exploitation of a Vulnerability
This measure determines the present state of exploitation of the vulnerability. It does not predict future exploitation or
measure feasibility or ease of adversary development of future exploit code; rather, it acknowledges available
information at time of analysis. As the current state of exploitation often changes over time, answers should be timestamped. Sources that can provide public reporting of active exploitation include the vendor’s vulnerability
notification, the National Vulnerability Database (NVD) and links therein, bulletins from relevant information sharing
and analysis centers (ISACs), and reliable threat reports that list either the CVE-ID or common name of the
vulnerability.
Table 2: Exploitation Decision Values
Value Definition
None There is no evidence of active exploitation and no public proof of concept (PoC)
of how to exploit the vulnerability.
Public PoC One of the following is true: (1) Typical public PoC exists in sources such as
Metasploit or websites like ExploitDB; or (2) the vulnerability has a well-known
method of exploitation. Some examples of condition (2) are open-source web
proxies that serve as the PoC code for how to exploit any vulnerability in the vein
of improper validation of Transport Layer Security (TLS) certificates, and
Wireshark serving as a PoC for packet replay attacks on ethernet or Wi-Fi
networks.
Active Shared, observable, and reliable evidence that cyber threat actors have used the
exploit in the wild; the public reporting is from a credible source.

@ahouseholder
Copy link
Contributor Author

Note to future resolver (probably me, but you never know): If you're resolving this one and #352 remains unresolved, you should probably go ahead and pick that one up too.

@ahouseholder ahouseholder added documentation Improvements or additions to documentation enhancement New feature or request labels Oct 19, 2023
@ahouseholder
Copy link
Contributor Author

@ahouseholder ahouseholder added this to the SSVC 202403 milestone Jan 23, 2024
@ccullen-cert ccullen-cert self-assigned this Feb 6, 2024
@ccullen-cert
Copy link
Contributor

Here is the pull request for this issue: #442

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants