Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.

Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.

Scheduled Pinned Locked Moved Uncategorized
6 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • metacurity@infosec.exchangeM This user is from outside of this forum
    metacurity@infosec.exchangeM This user is from outside of this forum
    metacurity@infosec.exchange
    wrote last edited by
    #1

    Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.

    Since then, CISA and MITRE have negotiated a new deal that puts the CVE program on firmer footing.

    My exclusive for CSO, with thanks to Peter Allor and others within the cybersecurity vulnerability community.

    CVE program funding secured, easing fears of repeat crisis
    https://www.csoonline.com/article/4142600/cve-program-funding-secured-easing-fears-of-repeat-crisis.html

    sycophantic@infosec.exchangeS jbm@infosec.exchangeJ 2 Replies Last reply
    0
    • metacurity@infosec.exchangeM metacurity@infosec.exchange

      Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.

      Since then, CISA and MITRE have negotiated a new deal that puts the CVE program on firmer footing.

      My exclusive for CSO, with thanks to Peter Allor and others within the cybersecurity vulnerability community.

      CVE program funding secured, easing fears of repeat crisis
      https://www.csoonline.com/article/4142600/cve-program-funding-secured-easing-fears-of-repeat-crisis.html

      sycophantic@infosec.exchangeS This user is from outside of this forum
      sycophantic@infosec.exchangeS This user is from outside of this forum
      sycophantic@infosec.exchange
      wrote last edited by
      #2

      @metacurity now can we fix it so bullshit doesn't get CVEs?

      sycophantic@infosec.exchangeS 1 Reply Last reply
      0
      • sycophantic@infosec.exchangeS sycophantic@infosec.exchange

        @metacurity now can we fix it so bullshit doesn't get CVEs?

        sycophantic@infosec.exchangeS This user is from outside of this forum
        sycophantic@infosec.exchangeS This user is from outside of this forum
        sycophantic@infosec.exchange
        wrote last edited by
        #3

        @metacurity pretty sure around here is where the program went to shit https://app.opencve.io/cve/CVE-2021-38759

        1 Reply Last reply
        0
        • metacurity@infosec.exchangeM metacurity@infosec.exchange

          Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.

          Since then, CISA and MITRE have negotiated a new deal that puts the CVE program on firmer footing.

          My exclusive for CSO, with thanks to Peter Allor and others within the cybersecurity vulnerability community.

          CVE program funding secured, easing fears of repeat crisis
          https://www.csoonline.com/article/4142600/cve-program-funding-secured-easing-fears-of-repeat-crisis.html

          jbm@infosec.exchangeJ This user is from outside of this forum
          jbm@infosec.exchangeJ This user is from outside of this forum
          jbm@infosec.exchange
          wrote last edited by
          #4

          @metacurity @joshbressers "Discussions have reportedly begun about potentially amending the EU’s Cyber Resilience Act to reference an identifier managed by ENISA rather than CVE."

          (From Paris here) I just checked the full CRA text, there is no mention of "CVE". Not a single one.

          metacurity@infosec.exchangeM 1 Reply Last reply
          0
          • jbm@infosec.exchangeJ jbm@infosec.exchange

            @metacurity @joshbressers "Discussions have reportedly begun about potentially amending the EU’s Cyber Resilience Act to reference an identifier managed by ENISA rather than CVE."

            (From Paris here) I just checked the full CRA text, there is no mention of "CVE". Not a single one.

            metacurity@infosec.exchangeM This user is from outside of this forum
            metacurity@infosec.exchangeM This user is from outside of this forum
            metacurity@infosec.exchange
            wrote last edited by
            #5

            @jbm @joshbressers I can't get any more specific without revealing the source who requested anonymity, but there was a discussion at a European conference he attended the week before last about adding, as an "add-on," an ANISA identifier rather than a CVE identifier to the CRA. He didn't say anything about there already being a mention of CVE in the CRA.

            adulau@infosec.exchangeA 1 Reply Last reply
            0
            • metacurity@infosec.exchangeM metacurity@infosec.exchange

              @jbm @joshbressers I can't get any more specific without revealing the source who requested anonymity, but there was a discussion at a European conference he attended the week before last about adding, as an "add-on," an ANISA identifier rather than a CVE identifier to the CRA. He didn't say anything about there already being a mention of CVE in the CRA.

              adulau@infosec.exchangeA This user is from outside of this forum
              adulau@infosec.exchangeA This user is from outside of this forum
              adulau@infosec.exchange
              wrote last edited by
              #6

              @metacurity

              There are already many vulnerability identifiers used across different databases and ecosystems. CVE is an important one, but it is only part of a broader and already distributed landscape of vulnerability information.

              If you want to explore the diversity of existing sources including CSAF advisories, GitHub security advisories, and disclosures coming from various regions (including China and Russia).

              You can see examples here:

              https://db.gcve.eu/recent

              Within the context of NIS2, the EUVD is expected to play the role of a reference point at the European level.

              In practice, this makes the handling of cross-references between different identifiers particularly important. While reference catalogues can exist, the assurance and publication of vulnerability information will likely remain (and increase) distributed across many contributors.

              @jbm @joshbressers

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups