Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a Requirements/Prerequisites Association for Vulnerabilities #100

Open
andrewbwm opened this issue Mar 15, 2023 · 1 comment
Open
Assignees
Labels
enhancement New feature or request

Comments

@andrewbwm
Copy link
Collaborator

andrewbwm commented Mar 15, 2023

Create a Requirements/Prerequisites association between SoftwareVulnerabilities and Data, Information, Application, or any other asset that could fit the concept. The attacker would have to compromise these assets before they are able to attempt to abuse the SoftwareVulnerabilities. The compromise would have to be asset specific FullAccess for Applications and Write for Data/Information might be good candidates.

While some SoftwareVulnerabilities would still have some more nuanced or specific requirements that the coarse design outlined above, but the change would still significantly increase the modelling capabilities of the language.

Something similar could be done for HardwareVulnerabilities if deemed relevant.

@andrewbwm andrewbwm added the enhancement New feature or request label Mar 15, 2023
@andrewbwm andrewbwm self-assigned this Mar 15, 2023
@andrewbwm
Copy link
Collaborator Author

andrewbwm commented Nov 14, 2023

Update regarding the new CVSS v4.0 Vulnerability Score(https://www.first.org/cvss/v4.0/specification-document):

  1. They sort of took out the special conditions(race conditions or other timing related things) out of Attack Complexity and it is now a separate score called Attack Requirements. We had some debates regarding how to interpret attack complexity early on.

  2. They have three values for User Interaction - None, Passive, Active. This is also something that we had issues with, that's why now vulnerabilities come with inherent user interaction. So, we were sort of ahead of them with this one.

  3. The scope change score is gone. They now have two separate sets of impact metrics. One set for the vulnerable system and one set for "subsequent systems". And I think this is cleaner and easier for us to work with if we create requirements and/or non-vulnerable targets for vulnerabilities. I quite like their approach and I think we could come up with a nice way to implement this in coreLang 1.1(1.2 or 2.0). Just a note, this would really make a relatively complex system even more complex, but I'd argue it might be worth it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant