-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VCIO: Collect CISA Known Exploited Vulnerabilities #1028
Comments
From #849
|
A question came up about the meaning or significance of the "dueDate" field in the schema at A perusal of the data at It seems that the dueDate applies to USA from this page: https://www.cisa.gov/known-exploited-vulnerabilities
|
The TLA |
The KEV catalog entries are identified by a CVE value; however, the additional data provided in the KEV entries are probably best directly associated with a VCID in VulnerableCode, so the following fields should be added to a vulnerability model definition, perhaps as a separate table with a 0-to-1 relationship (note that I have expanded the definitions beyond the rather basic descriptions provided in the KEV schema to make them more relevant to VCIO): kev_date_added (from dateAdded) kev_description (from shortDescription) kev_required_action (from requiredAction) kev_due_date (from dueDate) kev_resources_and_notes (from notes) kev_knownRansomwareCampaignUse (from knownRansomwareCampaignUse) |
Suggested appearance in the VCIO UI: I think the new fields would be best placed, only if there are any values obtained by an Improver from the KEV, on the |
We of course need an Improver to gather the KEV entries. Note that the dateAdded field is required in the KEV catalog, so that is probably the best way to search for new ones. |
@TG1999 @pombredanne I think we are ready to assign this one to a developer. |
I think this issue is interesting, and I'll assign it to myself, if no one working on it
|
@ziadhany go ahead! |
Done! closed by #1422 |
I am reopening this until we have this is verified as deployed on https://public.vulnerablecode.io |
The code here is done, I am closing this as we have some issue with the stability of the upstream data feed from CISA that is tracked separately. See: |
CISA publishes a catalog of Known Exploited Vulnerabilities at: https://www.cisa.gov/known-exploited-vulnerabilities-catalog.
The data appears to use CVE as a key. I downloaded the current CSV catalog of 860 items - there is also a JSON download and an option to subscribe to updates by email.
This data seems highly relevant for assessing the severity of a known vulnerability even if it seems limited to a pretty small subset of CVE vulnerabilities. We should consider using this data in the improver work flow.
The text was updated successfully, but these errors were encountered: