Skip to content

Commit 79a23b6

Browse files
committed
Fixes per github feedback
1 parent 4c144a5 commit 79a23b6

File tree

5 files changed

+25
-14
lines changed

5 files changed

+25
-14
lines changed
Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,24 @@
11
# Gathering Information About Exploitation
2+
23
```python exec="true" idprefix=""
34
from ssvc.decision_points.ssvc.exploitation import LATEST
45
from ssvc.doc_helpers import example_block
56

67
print(example_block(LATEST))
78
```
89

9-
[@householder2020historical] presents a method for searching the GitHub repositories of open-source exploit databases.
10+
## Public PoC
11+
[Historical Analysis of Exploit Availability Timelines](https://dl.acm.org/doi/10.5555/3485754.3485760) presents a method for searching the GitHub repositories of open-source exploit databases.
1012
This method could be employed to gather information about whether *PoC* is true.
1113
However, part (3) of *PoC* would not be represented in such a search, so more information gathering would be needed.
12-
For part (3), one approach is to construct a mapping of CWE-IDs which
14+
For part (3), one approach is to construct a mapping of CWE-IDs which
1315
always represent vulnerabilities with well-known methods of exploitation.
14-
We provide a list of possible CWE-IDs for this purpose below.
16+
We provide a list of possible CWE-IDs for this purpose at the [bottom of this page.](./#cwe-with-poc-examples-list)
17+
18+
!!! note "EPSS Scoring"
19+
The Exploit Prediction Scoring System (EPSS) estimates the likelihood of of a Public PoC. See [this page](../../using_epss) for more information on incorporating EPSS scoring to your SSVC model.
1520

21+
## Active
1622
Gathering information for *active* is a bit harder.
1723
If the vulnerability has a name or public identifier (such as a CVE-ID), a search of news websites, Twitter, the vendor's vulnerability description, and public vulnerability databases for mentions of exploitation is generally adequate.
1824
However, if the organization has the ability to detect exploitation attempts—for instance, through reliable and precise IDS signatures based on a public *PoC*—then detection of exploitation attempts also signals that *active* is the right choice.
@@ -22,8 +28,12 @@ Because most organizations do not conduct these processes fully for most inciden
2228
As long as those organizations also share detection methods and signatures, the results are usually quickly corroborated by the community.
2329
For these reasons, we assess public reporting by established security community members to be a good information source for *active*; however, one should not assume it is complete.
2430

31+
## None
2532
The description for *none* says that there is no **evidence** of *active* exploitation.
2633
This framing admits that an analyst may not be able to detect or know about every attack.
27-
Acknowledging that *Exploitation* values can change relatively quickly, we recommend conducting these searches frequently: if they can be automated to the organization's satisfaction, perhaps once a day (see also [Guidance on Communicating Results](../../howto/bootstrap/use.md)).
34+
Acknowledging that *Exploitation* values can change relatively quickly, we recommend conducting these searches frequently: if they can be automated to the organization's satisfaction, perhaps once a day (see also [Guidance on Communicating Results](../../howto/bootstrap/use.md)).
2835
An analyst should feel comfortable selecting *none* if they (or their search scripts) have performed searches in the appropriate places for public *PoC*s and *active* exploitation (as described above) and found *none*.
29-
Acknowledging that *Exploitation*.
36+
37+
38+
## CWE with PoC examples list
39+
{% include-markdown "../../_includes/cwe-with-poc-examples.md" heading-offset=1 %}

docs/howto/gathering_info/mission_impact.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,7 @@ print(example_block(LATEST))
88
```
99

1010
The factors that influence the mission impact level are diverse.
11-
The material here does not exhaustively discuss how a stakeholder should answer a question; that is a topic for future work.
1211
At a minimum, understanding mission impact should include gathering information about the critical paths that involve vulnerable components, viability of contingency measures, and resiliency of the systems that support the mission.
1312
There are various sources of guidance on how to gather this information; see for example the FEMA guidance in Continuity Directive 2 [@FCD2_2017] or OCTAVE FORTE [@tucker2018octave].
1413
This is part of risk management more broadly.
1514
It should require the vulnerability management team to interact with more senior management to understand mission priorities and other aspects of risk mitigation.
16-

docs/howto/gathering_info/system_exposure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,9 @@ Apply these heuristics in order and stop when one of them applies.
2424
- If the vulnerable component is on a network where other hosts can browse the web or receive email, choose *controlled*.
2525
- If the vulnerable component is in a third party library that is unreachable because the feature is unused in the surrounding product, choose *small*.
2626

27-
The unreachable vulnerable component scenario may be a point of concern for stakeholders like patch suppliers who often find it more cost-effective to simply update the included library to an existing fixed version rather than try to explain to customers why the vulnerable code is unreachable in their own product.
27+
The unreachable vulnerable component scenario may be a point of concern for stakeholders like [patch suppliers](howto/supplier_tree.md) who often find it more cost-effective to simply update the included library to an existing fixed version rather than try to explain to customers why the vulnerable code is unreachable in their own product.
2828
In those cases, we suggest the stakeholder reviews the decision outcomes of the tree to ensure the appropriate action is taken (paying attention to [*defer*](../../howto/supplier_tree.md) vs [*scheduled*](../../howto/supplier_tree.md), for example).
2929

30-
If you have suggestions for further heuristics, or potential counterexamples to these, please describe the example and reasoning in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
3130

31+
!!! question "Have an idea for something we missed?"
32+
If you have suggestions for further heuristics, or potential counterexamples to these, please describe the example and reasoning in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).

docs/howto/gathering_info/technical_impact.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,15 @@ print(example_block(LATEST))
1010
Assessing *Technical Impact* amounts to assessing the degree of control over the vulnerable component the attacker stands to gain by exploiting the vulnerability.
1111
One way to approach this analysis is to ask whether the control gained is *total* or not.
1212
If it is not total, it is *partial*.
13-
If an answer to one of the following questions is _yes_, then control is *total*.
13+
If an answer to one of the following questions is *yes*, then control is *total*.
1414
After exploiting the vulnerability,
1515

1616
- can the attacker install and run arbitrary software?
1717
- can the attacker trigger all the actions that the vulnerable component can perform?
1818
- does the attacker get an account with full privileges to the vulnerable component (administrator or root user accounts, for example)?
1919

2020
This list is an evolving set of heuristics.
21-
If you find a vulnerability that should have *total* *Technical Impact* but that does not answer yes to any of
22-
these questions, please describe the example and what question we might add to this list in an issue on the
23-
[SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
21+
22+
!!! question "Have an idea for something we missed?"
23+
24+
If you find a vulnerability that should have *total* *Technical Impact* but that does not answer yes to any of these questions, please describe the example and what question we might add to this list in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).

docs/howto/gathering_info/value_density.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@ print(example_block(LATEST))
88
```
99

1010
The heuristics presented in the *Value Density* definitions involve whether the system is usually maintained by a dedicated professional, although we have noted some exceptions (such as encrypted mobile messaging applications).
11-
If there are additional counterexamples to this heuristic, please describe them and the reasoning why the system should have the alternative decision value in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
11+
!!! question "Have an idea for something we missed?"
12+
If there are additional counterexamples to this heuristic, please describe them and the reasoning why the system should have the alternative decision value in an issue on the [SSVC GitHub](https://github.com/CERTCC/SSVC/issues).
1213

1314
An analyst might use market research reports or Internet telemetry data to assess an unfamiliar product.
1415
Organizations such as Gartner produce research on the market position and product comparisons for a large variety of systems.

0 commit comments

Comments
 (0)