Colleagues,

The CVE Program is pleased to announce the release of CVE Record Format 
5.1.0<https://github.com/CVEProject/cve-schema/blob/master/README.md> (view 
release notes<https://github.com/CVEProject/cve-schema/releases/tag/v5.1.0>) 
and CVE Services 
2.3.0<https://github.com/CVEProject/cve-services/releases/tag/v2.3.0> (view 
release notes<https://github.com/CVEProject/cve-services/releases/tag/v2.3.0>). 
This newest version release of the CVE Record Format further enables additional 
vulnerability-related information to be included by CVE Numbering Authorities 
(CNAs)<https://cve.mitre.rip/ProgramOrganization/CNAs> in CVE 
Records<https://cve.mitre.rip/ResourcesSupport/Glossary?activeTerm=glossaryRecord>
 at the time of disclosure. CVE Services was updated to support this new 
version of the CVE Record Format.

As noted in the CVE Blog article "New CVE Record Format Enables Additional Data 
Fields at Time of 
Disclosure<https://cve.mitre.rip/Media/News/item/blog/2024/04/30/New-CVE-Record-Format-Enables-Additional-Data>,"
 the CVE Program has "evolved its record 
format<https://cve.mitre.rip/AllResources/CveServices#CveRecordFormat> to enhance 
automation capabilities and data enrichment. This format, utilized by CVE 
Services<https://cve.mitre.rip/AllResources/CveServices>, facilitates the 
reservation of CVE IDs and the inclusion of data elements like CVSS, CWE, CPE, 
and other data into the CVE Record at the time of issuing a security advisory. 
This means the authoritative source (within their CNA scope) of vulnerability 
information - those closest to the products themselves - can accurately report 
enriched data to CVE directly and contribute more substantially to the 
vulnerability management process."

CVE Record Format 5.1.0 furthers that effort with key enhancements.

Updates for CVE Record Format 5.1.0

The key updates for the new release include:


  *   Support for the Forum of Incident Response and Security 
Teams<https://www.first.org/>' (FIRST) Common Vulnerability Scoring System 
(CVSS) Version 4.0<https://www.first.org/cvss/v4-0>. CVE Records can be defined 
using the CVSS v2, v3, v3.1, and now v4 scoring standards
  *   The versionType field now allows:
     *   Single product identification (not just ranges)
     *   Support for additional product identifiers including UPC, GTIN, GMN, 
Package URLs, and SKUs
  *   Bug fixes including stricter validation to prevent typos in required and 
optional fields, as well as to prevent unexpected fields in various locations 
within the schema

A complete list of updates is available in the release 
notes<https://github.com/CVEProject/cve-schema/releases/tag/v5.1.0>.

Terminology Change

This release also marks a change in how the CVE Program will refer to the CVE 
JSON 5.x record format in all CVE-related communications, on the website, etc., 
moving forward. Beginning with this release, "CVE JSON 5.x" will now be 
referred to as the "CVE Record Format" even though it will continue to be based 
upon CVE JSON.

The full title of this release is: "CVE Record Format Version 5.1.0".

Updates for CVE Services 2.3.0

CVE Services<https://cve.mitre.rip/AllResources/CveServices> was updated to 
version 2.3.0 to support the release of CVE Record Format 5.1.0. A complete 
list of updates is available in the release 
notes<https://github.com/CVEProject/cve-services/releases/tag/v2.3.0>.

Detailed Release Notes

For more information on the features, bugs, etc., noted above, and additional 
compatibility considerations, please see the following on GitHub:


  *   CVE Record Format Version 5.1.0 Release 
Notes<https://github.com/CVEProject/cve-schema/releases/tag/v5.1.0>
  *   CVE Services 2.3.0 Release 
Notes<https://github.com/CVEProject/cve-services/releases/tag/v2.3.0>


Sincerely,
CVE Program Secretariat
cve-prog-secretar...@mitre.org<mailto:cve-prog-secretar...@mitre.org>

[A picture containing text, clipart  Description automatically generated]


Reply via email to