Published: April 18, 2021
Author(s)
Assane Gueye (NIST), Peter Mell (NIST)
Conference
Name: The Seventh International Conference on Advances and Trends in Software Engineering (SOFTENG 2021)
Dates: 04/18/2021 - 04/22/2021
Location: [Virtual] Porto, Portugal
Understanding the landscape of software vulnerabilities is key for developing effective security solutions. Fortunately, the evaluation of vulnerability databases that use a framework for communicating vulnerability attributes and their severity scores, such as the Common Vulnerability Scoring System (CVSS), can help shed light on the nature of publicly published vulnerabilities. In this paper, we characterize the software vulnerability landscape by performing a historical and statistical analysis of CVSS vulnerability metrics over the period of 2005-2019 through using data from the National Vulnerability Database. Each vulnerability is assigned a CVSS vector that aggregates a set of vulnerability metrics. We use these metrics to conduct four studies analyzing the following: the distribution of CVSS scores (both empirical and theoretical), the distribution of CVSS metric values and how vulnerability characteristics change over time, the relative rankings of the most frequent metric value over time, and the most prevalent patterns of co-occurrence of the metrics. Our resulting analysis shows that the vulnerability threat landscape has been dominated by only a few vulnerability types and has changed little during the time period of the study. For example, the overwhelming majority of vulnerabilities are exploitable over the network. The complexity to successfully exploit these vulnerabilities is dominantly low; very little authentication to the target victim is necessary for a successful attack. And most of the flaws require very limited interaction with users. However on the positive side, the damage of these vulnerabilities is mostly confined within the security scope of the impacted components.
Understanding the landscape of software vulnerabilities is key for developing effective security solutions. Fortunately, the evaluation of vulnerability databases that use a framework for communicating vulnerability attributes and their severity scores, such as the Common Vulnerability Scoring...
See full abstract
Understanding the landscape of software vulnerabilities is key for developing effective security solutions. Fortunately, the evaluation of vulnerability databases that use a framework for communicating vulnerability attributes and their severity scores, such as the Common Vulnerability Scoring System (CVSS), can help shed light on the nature of publicly published vulnerabilities. In this paper, we characterize the software vulnerability landscape by performing a historical and statistical analysis of CVSS vulnerability metrics over the period of 2005-2019 through using data from the National Vulnerability Database. Each vulnerability is assigned a CVSS vector that aggregates a set of vulnerability metrics. We use these metrics to conduct four studies analyzing the following: the distribution of CVSS scores (both empirical and theoretical), the distribution of CVSS metric values and how vulnerability characteristics change over time, the relative rankings of the most frequent metric value over time, and the most prevalent patterns of co-occurrence of the metrics. Our resulting analysis shows that the vulnerability threat landscape has been dominated by only a few vulnerability types and has changed little during the time period of the study. For example, the overwhelming majority of vulnerabilities are exploitable over the network. The complexity to successfully exploit these vulnerabilities is dominantly low; very little authentication to the target victim is necessary for a successful attack. And most of the flaws require very limited interaction with users. However on the positive side, the damage of these vulnerabilities is mostly confined within the security scope of the impacted components.
Hide full abstract
Keywords
vulnerabilities; statistics
Control Families
None selected