CVE Board Meeting Notes April 3, 2024 (9:00 am - 11:00 am EDT) Agenda
* Introduction * Topics * Legacy File Deprecation and Question on CSV Support * VulnCon * CVE Game Plan for NVD Lull * Guest Speaker from CISA: Understanding Open Source in a CVE Context * Board Nomination and Vote * Open Discussion * Review of Action Items * Closing Remarks New Action Items from Today's Meeting New Action Item Responsible Party None Legacy File Deprecation and Question on CSV Support * The CVE Program will set up a discussion with DISA regarding the scheduled deprecation of the legacy CVE CSV download format and short and long term needs of stakeholders * Concurrent with the ongoing discussions with downstream consumers, the CVE Program (via the QWG) will look at options for converting the current CVE Record Format (CVE JSON v5.x) to CSV in anticipation of either producing a download CVS file, or providing guidance for those users who will need to convert to CSV locally VulnCon * The Board had a hotwash after the inaugural VulnCon conference, but not all Board members were able to attend-just wanted to give those Board members an opportunity to give their perspective on VulnCon * Board member comments: * Loved VulnCon; have some notes written down and will send to VCEWG Chairs * Most interesting talk was one about data quality; a strategic imperative for the CVE Program is to improve data quality, which is difficult to do. (Discussion on data quality continues under next topic) * Coming out of VulnCon, we have a pretty good idea of a tiered approach that could be used (within the QWG) to improve data quality and a framework for how to prioritize data within the schema. * Need to be careful about not making the process (of improving data quality) too onerous for volunteer participants CVE Game Plan for NVD Lull * The CVE Program will be reaching out to CNAs (top 10 code-owning CNAs by number of publications) to make sure that they are aware that they can submit enriched data (e.g., CPE, CWE, CVSS) directly to the CVE Program, rather than submitting separately to the NVD. * Preliminary plan is for the CVE Program to offer to meet with the Top 10 by April 15 to discuss how those CNAs can add the optional data to their records. * The Secretariat will review CVMap to determine what data the Top 10 are providing to NVD; the program can figure out how to help those that are not providing any data * Additionally, the CVE Program will host podcasts, create blog posts, etc., to explain this to the community. * Board member comments: * CVE Program is in the position to take this enriched data from willing providers, so we need to let everyone know * Some CNAs may have enriched data that they could provide but do not realize that the program is able to ingest it * We have to roll back some legacy methods of submitting data to the CVE Program and NVD-CNAs may not realize they can submit it all to CVE Program via JSON 5.1 and then that data will roll into the NVD * There is an opportunity here for expanded federation with regards to enriched data. We need this to catch fire in the ecosystem and it starts with the CVE Program asking for it and we can determine who is willing and able to provide it. We can work with those willing but not able to help them provide it. * CVE Program may begin some sort of recognition incentive for those providing enriched data * Any organization that can provide enriched data to a CVE Record should do so as an ADP * Downstream consumers can decide for themselves what data they want to consume and what they do not care about * No need to accept all ADP results; consumers can choose to ignore what they want * If ADP functionality is out there and real, that functionality should include adding enriched data * Secretariat reference ADP will be ready to go by end of May * CVE Program will be able to support a production environment for the CISA ADP by end of April (that is not to say that CISA will go into production at that time) * No Board members voiced disagreement with the approach to contact the Top 10 CNAs to ask them to submit enriched data directly to the CVE Program via JSON 5.1 Guest Speaker from CISA: Understanding Open Source in a CVE Context * CVE Program has struggled with Open Source (O/S) * CVE Project Leader asked the guest speaker from CISA weeks ago if there was a willingness to come and talk to the CVE Board about this topic-so they are here today to provide their perspective on the topic * The guest speaker from CISA presented slides from their perspective and stated that we need to re-think the current model of the data model and process model for open source in a global context. * Comments from Board members: * New guidance in the new rules may help mitigate the problem; I share your concerns with O/S CNAs coming online will put pressure on things. Numbers will be higher...but we still need IDs on these things. The answer does not seem to be fewer CVEs. * How does the CVE Program not collapse under the weight of exponential growth due to O/S? * The European Cyber Resilience Act<https://www.european-cyber-resilience-act.com/> (CRA)-is happening. It's a law. This will mean any commercial software sold in the EU will need a mark on it (self-certify) and will require things like CVEs, etc. Board Nomination and Vote * Two Board members met with a Board nominee at VulnCon last week and he voiced exasperation at the way the Board is handling his candidacy. They explained what was going on. The Board members asked if he'd be willing to go through an up/down vote as an individual board member even though he may lose, and the Board nominee indicated he wanted that vote. * If we decide to move forward with the org liaison kind of position, if this Board nominee gets voted down as an individual board member, he should not have to wait the year before he can run for an org position. * The org position is a different entity, and one vote does not have anything to do with the other * Motion: Give the Board nominee an up/down vote as individual board member. * Using the "raise your hand" feature in Teams, the Board participated in a vote. Raise your hand if you agree with the up/down vote. * 12 of 12 Board members in the meeting agree to go forward with a vote Open Discussion * Board members asked if there is an easy way for a vulnerability reporter to know which CNA owns which product. * There is not an easy way-this is a good use case for having a product registry * Some CNAs include all covered products within their scope statement * Some Board members agreed to meet offline to further discuss this topic Review of Action Items Out of time. Next CVE Board Meetings * Wednesday, April 3, 2024, 9:00am - 11:00am (EDT) * Wednesday, April 17, 2024, 2:00pm - 4:00pm (EDT) * Wednesday, May 1, 2024, 9:00am - 11:00am (EDT) * Wednesday, May 15, 2024, 2:00pm - 4:00pm (EDT) * Wednesday, May 29, 2024, 9:00am - 11:00am (EDT) * Wednesday, June 12, 2024, 2:00pm - 4:00pm (EDT) Discussion Topics for Future Meetings * End user working group write-up discussion * Board discussions and voting process * ADP discussion * Sneak peek/review of annual report template SPWG is working on * Bulk download response from community about Reserved IDs * CVE Services updates and website transition progress (as needed) * Working Group updates (every other meeting) * Council of Roots update (every other meeting) * Researcher Working Group proposal for Board review * Vision Paper and Annual Report * Secretariat review of all CNA scope statements * Proposed vote to allow CNAs to assign for insecure default configurations * CVE Communications Strategy