Date Published: February 2020
Comments Due: March 20, 2020 (public comment period is CLOSED)
Email Questions to: NISTIR_8246-Comments@nist.gov
, ,
The number of Common Vulnerabilities and Exposures identifiers (CVE IDs) created year over year has rapidly increased, and this trend is expected to continue indefinitely. Currently, a National Vulnerability Database (NVD) analyst manually reviews each CVE and attaches multiple forms of CVE metadata used by downstream consumers to prioritize and assist automated vulnerability scanning tools. This is a manually intensive process, and in many cases, this metadata is provided by the source, or CNA (CVE Numbering Authority), of the CVE with no policies or procedures in place to validate and accept the information.
This draft NISTIR seeks to leverage the strength of technical knowledge provided by the CNAs and the application of consistent and unbiased CVE metadata provided by NVD analysts through the formalization of a CVE entry metadata submission process. This will allow for a more efficient integration of the CNAs’ efforts into the NVD analyst workflow, which will directly benefit downstream users and improve the security of our national IT infrastructure.
NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy—Inclusion of Patents in ITL Publications.
None selected
Publication:
NISTIR 8246 (Draft) (DOI)
Local Download
Supplemental Material:
Current Version of Table 3 (pdf)
Document History:
02/10/20: NISTIR 8246 (Draft)
Security and Privacy
audit & accountability; maintenance; security automation