Colleagues,

The CVE Program is proud to announce that 
CISA<https://cve.mitre.rip/PartnerInformation/ListofPartners/partner/CISA> is the 
CVE Program’s first-ever CVE Authorized Data Publisher 
(ADP)<https://cve.mitre.rip/ProgramOrganization/ADPs>. As an ADP, CISA is 
authorized to enrich the content of CVE 
Records<https://cve.mitre.rip/ResourcesSupport/Glossary?activeTerm=glossaryRecord>
 published by CVE Numbering Authorities 
(CNAs)<https://cve.mitre.rip/ProgramOrganization/CNAs> with additional, related 
information (e.g., risk scores, references, vulnerability characteristics, 
translations, etc.).
The ADP role focuses on adding informational elements to CVE Records within a 
specific scope that is approved by the CVE 
Board<https://cve.mitre.rip/ProgramOrganization/Board>. While an ADP is eligible 
to augment the information in CVE Records, the ADP cannot modify the data the 
CNA has published in their “CNA container.” Instead, all ADP updates to CVE 
Records will occur in a separate organizational “ADP container.”
The intent of ADPs is to enrich and enhance the value of CVE Record information 
providing the vulnerability management community with additional, valuable 
information about a specific CVE Record. Learn more about how an organization 
can become an ADP here<https://cve.mitre.rip/ProgramOrganization/ADPs#apply>.
Introducing the CISA ADP
The CISA ADP is providing three components to enrich CVE Records:

  1.  Stakeholder-Specific Vulnerability Categorization 
(SSVC)<https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc>.
  2.  Known Exploited Vulnerabilities 
(KEV)<https://www.cisa.gov/known-exploited-vulnerabilities-catalog> catalog 
data.
  3.  “Vulnrichment” updates (e.g., missing CVSS<https://www.first.org/cvss/'>, 
CWE<https://cve.mitre.rip/external/cwe.mitre.org/>, CPE<https://nvd.nist.gov/products/cpe> information 
for CVE Records that meet specific threat characteristics).
CISA ADP Process
The CISA ADP will provide a two-pass enrichment for new CVE Records as they are 
published, starting from February 2024.
For every new CVE Record, the CISA ADP will publish the three relevant decision 
points in CISA’s SSVC triage process: Exploitation, Automatable, and Technical 
Impact. This is the first pass of enrichment which all new CVE Records will 
receive.
For those CVE Records that score at least one of:

  *   Technical Impact: Total
  *   Automatable: Yes
  *   Exploitation: Proof-Of-Concept, or
  *   Exploitation: Active
and are lacking one or more of CWE, CVSS, or CPE data, the CISA ADP will take a 
second pass of analysis to determine the missing CWE, CVSS, CPE metric, and add 
those metrics to the CISA ADP container on those CVE Records.
Of these issues, in some rare cases, it may be impossible to confidently field 
a guess on CWE, CVSS, or CPE. In those cases, the CISA ADP will not venture 
such a guess.
If a CNA Later Updates the CVE Record
If a CNA later updates a CVE Record with their own CWE, CVSS, or CPE data, the 
CISA ADP will remove their assessed metrics for those specific elements from 
the updated CVE Record. This approach will reduce duplicate (and conflicting) 
data within the CVE Record. In the rare event that there is a CWE, CVSS, or CPE 
string provided by the originating CNA and the CISA ADP, the originating CNA’s 
data should take precedence for any decision making.
Similarly, if a CVE Record is updated by the originating CNA to provide 
information that would impact the SSVC decision points, those SSVC decision 
points will be updated shortly thereafter by the CISA ADP.
Comments or Concerns
Please contact the CISA ADP on 
GitHub<https://github.com/cisagov/vulnrichment?tab=readme-ov-file#issues-and-pull-requests>
 regarding the content provided in their ADP container.

Respectfully,
CVE Program Secretariat
cve-prog-secretar...@mitre.org<mailto:cve-prog-secretar...@mitre.org>

[A picture containing text, clipart  Description automatically generated]


Reply via email to