You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
from ssvc.decision_points.ssvc.exploitation importLATEST
4
5
from ssvc.doc_helpers import example_block
5
6
6
7
print(example_block(LATEST))
7
8
```
8
9
9
-
[@householder2020historical] presents a method for searching the GitHub repositories of open-source exploit databases.
10
+
## Public PoC
11
+
[Historical Analysis of Exploit Availability Timelines](https://dl.acm.org/doi/10.5555/3485754.3485760) presents a method for searching the GitHub repositories of open-source exploit databases.
10
12
This method could be employed to gather information about whether *PoC* is true.
11
13
However, part (3) of *PoC* would not be represented in such a search, so more information gathering would be needed.
12
-
For part (3), one approach is to construct a mapping of CWE-IDs which
14
+
For part (3), one approach is to construct a mapping of CWE-IDs which
13
15
always represent vulnerabilities with well-known methods of exploitation.
14
-
We provide a list of possible CWE-IDs for this purpose below.
16
+
We provide a list of possible CWE-IDs for this purpose at the [bottom of this page.](./#cwe-with-poc-examples-list)
17
+
18
+
!!! note "EPSS Scoring"
19
+
The Exploit Prediction Scoring System (EPSS) estimates the likelihood of of a Public PoC. See [this page](../../using_epss) for more information on incorporating EPSS scoring to your SSVC model.
15
20
21
+
## Active
16
22
Gathering information for *active* is a bit harder.
17
23
If the vulnerability has a name or public identifier (such as a CVE-ID), a search of news websites, Twitter, the vendor's vulnerability description, and public vulnerability databases for mentions of exploitation is generally adequate.
18
24
However, if the organization has the ability to detect exploitation attempts—for instance, through reliable and precise IDS signatures based on a public *PoC*—then detection of exploitation attempts also signals that *active* is the right choice.
@@ -22,8 +28,12 @@ Because most organizations do not conduct these processes fully for most inciden
22
28
As long as those organizations also share detection methods and signatures, the results are usually quickly corroborated by the community.
23
29
For these reasons, we assess public reporting by established security community members to be a good information source for *active*; however, one should not assume it is complete.
24
30
31
+
## None
25
32
The description for *none* says that there is no **evidence** of *active* exploitation.
26
33
This framing admits that an analyst may not be able to detect or know about every attack.
27
-
Acknowledging that *Exploitation* values can change relatively quickly, we recommend conducting these searches frequently: if they can be automated to the organization's satisfaction, perhaps once a day (see also [Guidance on Communicating Results](../../howto/bootstrap/use.md)).
34
+
Acknowledging that *Exploitation* values can change relatively quickly, we recommend conducting these searches frequently: if they can be automated to the organization's satisfaction, perhaps once a day (see also [Guidance on Communicating Results](../../howto/bootstrap/use.md)).
28
35
An analyst should feel comfortable selecting *none* if they (or their search scripts) have performed searches in the appropriate places for public *PoC*s and *active* exploitation (as described above) and found *none*.
Copy file name to clipboardExpand all lines: docs/howto/gathering_info/mission_impact.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,7 @@ print(example_block(LATEST))
8
8
```
9
9
10
10
The factors that influence the mission impact level are diverse.
11
-
The material here does not exhaustively discuss how a stakeholder should answer a question; that is a topic for future work.
12
11
At a minimum, understanding mission impact should include gathering information about the critical paths that involve vulnerable components, viability of contingency measures, and resiliency of the systems that support the mission.
13
12
There are various sources of guidance on how to gather this information; see for example the FEMA guidance in Continuity Directive 2 [@FCD2_2017] or OCTAVE FORTE [@tucker2018octave].
14
13
This is part of risk management more broadly.
15
14
It should require the vulnerability management team to interact with more senior management to understand mission priorities and other aspects of risk mitigation.
Copy file name to clipboardExpand all lines: docs/howto/gathering_info/system_exposure.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,8 +24,9 @@ Apply these heuristics in order and stop when one of them applies.
24
24
- If the vulnerable component is on a network where other hosts can browse the web or receive email, choose *controlled*.
25
25
- If the vulnerable component is in a third party library that is unreachable because the feature is unused in the surrounding product, choose *small*.
26
26
27
-
The unreachable vulnerable component scenario may be a point of concern for stakeholders like patch suppliers who often find it more cost-effective to simply update the included library to an existing fixed version rather than try to explain to customers why the vulnerable code is unreachable in their own product.
27
+
The unreachable vulnerable component scenario may be a point of concern for stakeholders like [patch suppliers](howto/supplier_tree.md) who often find it more cost-effective to simply update the included library to an existing fixed version rather than try to explain to customers why the vulnerable code is unreachable in their own product.
28
28
In those cases, we suggest the stakeholder reviews the decision outcomes of the tree to ensure the appropriate action is taken (paying attention to [*defer*](../../howto/supplier_tree.md) vs [*scheduled*](../../howto/supplier_tree.md), for example).
29
29
30
-
If you have suggestions for further heuristics, or potential counterexamples to these, please describe the example and reasoning in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
31
30
31
+
!!! question "Have an idea for something we missed?"
32
+
If you have suggestions for further heuristics, or potential counterexamples to these, please describe the example and reasoning in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
Copy file name to clipboardExpand all lines: docs/howto/gathering_info/technical_impact.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,14 +10,15 @@ print(example_block(LATEST))
10
10
Assessing *Technical Impact* amounts to assessing the degree of control over the vulnerable component the attacker stands to gain by exploiting the vulnerability.
11
11
One way to approach this analysis is to ask whether the control gained is *total* or not.
12
12
If it is not total, it is *partial*.
13
-
If an answer to one of the following questions is _yes_, then control is *total*.
13
+
If an answer to one of the following questions is *yes*, then control is *total*.
14
14
After exploiting the vulnerability,
15
15
16
16
- can the attacker install and run arbitrary software?
17
17
- can the attacker trigger all the actions that the vulnerable component can perform?
18
18
- does the attacker get an account with full privileges to the vulnerable component (administrator or root user accounts, for example)?
19
19
20
20
This list is an evolving set of heuristics.
21
-
If you find a vulnerability that should have *total**Technical Impact* but that does not answer yes to any of
22
-
these questions, please describe the example and what question we might add to this list in an issue on the
!!! question "Have an idea for something we missed?"
23
+
24
+
If you find a vulnerability that should have *total* *Technical Impact* but that does not answer yes to any of these questions, please describe the example and what question we might add to this list in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
Copy file name to clipboardExpand all lines: docs/howto/gathering_info/value_density.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,8 @@ print(example_block(LATEST))
8
8
```
9
9
10
10
The heuristics presented in the *Value Density* definitions involve whether the system is usually maintained by a dedicated professional, although we have noted some exceptions (such as encrypted mobile messaging applications).
11
-
If there are additional counterexamples to this heuristic, please describe them and the reasoning why the system should have the alternative decision value in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
11
+
!!! question "Have an idea for something we missed?"
12
+
If there are additional counterexamples to this heuristic, please describe them and the reasoning why the system should have the alternative decision value in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
12
13
13
14
An analyst might use market research reports or Internet telemetry data to assess an unfamiliar product.
14
15
Organizations such as Gartner produce research on the market position and product comparisons for a large variety of systems.
0 commit comments