[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CVE program priorities



On 12/22/2015 12:55 PM, Boyle, Stephen V. wrote:
> coverage of the software and devices used in the U.S. IT sector.

What is "the U.S. IT sector"?  Is "U.S. IT sector" intended to include 
devices used in our homes or micro-businesses with firmware developed 
abroad, especially if they are connected to the internet, or does this 
only cover software and devices used in U.S. enterprises?  Also, would 
US-based firms using foreign software when they do business abroad be 
covered;  is that "used in the U.S. IT sector" or not?  Whose 
responsibility is it (or should it be) to generate identifiers for 
software and devices "not used in the U.S. IT sector", but used in or 
for U.S. supply chains and used by important partners we collaborate 
with, trust and rely upon?  Inasmuch as MITRE and its CNAs shoulder the 
responsibility of managing identifiers for "the U.S. IT sector", who 
should be responsible for international IT sectors?

I'm wondering how much software and how many devices exist that won't be 
used somewhere in the U.S. at some point.  Does trying to exclude "never 
used in the U.S." software and devices really provide a significant 
workload relief, worth the effort of sorting and the risk of error?  I 
ask because it seems a given that manufacturers and software vendors 
will try to target everything they have at the U.S. market, due to 
economies of scale.  The criterion "used in the U.S. IT sector" is 
indistinct, and I doubt its usefulness and practicality.  Instead, 
"products developed by firms or organizations based in the U.S." would 
be more clearcut, and so would be the responsibility.  Coverage would be 
significantly reduced and more manageable, but consequently it would be 
narrow to the point of making the CVE less useful.

Given the conflicting desire to restrict the workload but usefulness of 
prompt and broad coverage, perhaps it's time to ask other countries or 
regions (I mean to include the European Union in this) to be responsible 
for their share of produced software and to peer with MITRE using 
"Olympic swim lanes" (eh, Olympic as in "a time for laying aside 
political and religious differences") that would avoid duplication of 
effort and redundant identifiers?  Besides directly contacting foreign 
organizations, I would think this is worthy of the United Nations' 
attention, given its goal of promoting international co-operation, and 
given the ubiquitous distribution of software.  This sounds idealistic 
but the very idea is important.  I believe this needs to be stated and 
recognized as something desirable, and even needs to be attempted so 
that perhaps we'll obtain through compromise an intermediate solution 
that works well enough.

Other related "can of worms" thoughts: Can CNAs be foreign nations, or 
could foreign nations have the power to designate CNAs, or would it be 
preferable that they have their own identifiers?  Would it be useful if 
they used different letters than 'CVE' but kept the format similar and 
recognizable (a Universally Unique Vulnerability ID, UUVID)?  Can they 
be trusted enough, and what mechanisms could detect misbehavior, and 
then work around it or even repair it?

Pascal


Page Last Updated or Reviewed: December 30, 2015