Los expertos tienen dudas en la eficacia de la base de datos CVE

Experts have doubts in the effectiveness of the CVE database and advised researchers not to rely solely on this threat database when scanning for vulnerabilities in the system.

UNAs stated in the report of the company Risk Based Security, solución de este tipo hará que un profesionales de TI pierden casi un tercio de todas las vulnerabilidades.

“If your organization is currently relying on CVE (and most are), al menos 33% of all disclosed vulnerabilities are completely unknown to you”, — said the company’s cofounder Jake Kouns in the report.

según la compañía, the problem is that the MITRE team basically waits until researchers or manufacturers inform the organization about the vulnerability to assign a CVE identifier.

Así, if a specialist does not report a problem and does not request a CVE, the vulnerability will not be entered into the database at all. En lugar, information about it will be entered into other databases, Por ejemplo, BitBucket, SourceForge, GitHub, or in own manufactrer’s databases.

leer también: The expert created a PoC exploit that bypasses PatchGuard protection

As stated in the report, many CVEs remain in a “reserved” state for a long time. CVE is reserved if details about it have not yet been published for security reasons.

sin embargo, CVE is slow to process the details and update the CVE report for many bugs even after details are in the public domain, the report warns”, - escribe Infosecurity Magazine author Danny Bradbury.

The nonprofit CVE project turned 20 last month, and over time, it covered a relatively small number of vulnerabilities. sin embargo, por 2017, the number of vulnerabilities included in it increased by 128%, and every year it becomes more and more.

LEER  Pwn2Own organizadores ofrecerán a los participantes piratear sistemas de ICS

Problem processing slowed as the organization’s team faced a greater workload, the report said. The CVE program has responded by increasing the number of CVE Numbering Authorities (CNAs), which are the organizations that can grant a CVE number for a reported security bug. Mitre is working hard to keep up with the increasing volume of bugs, but no one will deny that it’s a challenge.

[Total:0    Promedio:0/5]

Acerca de Trojan Killer

Trojan Killer llevar portátil en su dispositivo de memoria. Asegúrese de que usted es capaz de ayudar a su PC resistir cualquier amenaza cibernética donde quiera que vaya.

también puedes ver

MageCart en la plataforma de nube Heroku

Los investigadores encontraron Varios MageCart Web skimmers En Heroku Cloud Platform

Investigadores de Malwarebytes informaron sobre la búsqueda de varios skimmers MageCart web en la plataforma de nube Heroku …

Android Spyware CallerSpy

máscaras spyware CallerSpy como una aplicación de chat Android

expertos de Trend Micro descubrieron que el malware CallerSpy, que enmascara como una aplicación de chat y Android, …

Deja una respuesta