Patrick Garrity 👾🛹💙’s Post

View profile for Patrick Garrity 👾🛹💙, graphic

Cybersecurity/Vulnerability Researcher

It’s great to see Cybersecurity and Infrastructure Security Agency’s efforts in stepping up to fill the CVE enrichment gap that the National Institute of Standards and Technology (NIST) NVD has neglected to address. #cybersecurity #infosecurity #riskmanagement #vulnerabilitymanagement

We understand that timely and accurate information about Common Vulnerabilities and Exposures (CVEs) is critical to help organizations prioritize remediation, understand trends, and drive vendors to address classes of vulnerability.  Today, we want to inform organizations of an enrichment effort we are calling "Vulnrichment," which focuses on adding Common Platform Enumeration, Common Vulnerability Scoring System, Common Weakness Enumeration, and Known Exploited Vulnerabilities to CVEs. We recently enriched 1,300 CVEs and continue to diligently work to ensure all submitted CVEs are enriched. We ask all CVE Numbering Authorities (CNAs) to provide complete CVEs when making initial submission to CVE.org. Soon, we’ll also start sharing decision points from CISA’s Stakeholder-Specific Vulnerability Categorization (SSVC). We will use CVE JSON format so stakeholders can immediately start incorporating these updates into vulnerability management processes. This enrichment effort can be found at our Vulnrichment GitHub Repository: https://lnkd.in/gbgHjGZ9. Our GitHub approach includes a readme with more info and enables stakeholders to report errors and offer suggestions directly to CISA. If you have questions or constructive input on vulnerability enrichment, please contact us at [email protected]. 

  • No alternative text description for this image
Wim Stoffelen

Program Manager CISO Training | Founder CISO Tribe | Project Manager LSEC | CYSSME Cybersecurity for European SMEs

7mo

Really stoked to see this. As many Infosec thought leaders have opined CISA makes a lot of sense as a leader for alignment of vulnerability efforts. It does leave me cautious to see the data coming out of the backlog. Statistically there must be a handful of vulnerabilities of note in that backlog which will require expedited attention. Do you have a similar POV Patrick Garrity?

Like
Reply
Cristiano Santos

AppSec Squad Leader | Vulnerability Management | Cyber Security | OWASP Chapter Leader | Postgraduate Professor | Speaker | DevSecOps | Conviso Application Security

7mo
LingRaj Patil

I Help Companies Reduce Cyber Risk | VP of Marketing at ArmorCode | Community Builder | Security Warrior | Wannabe Storyteller

7mo

Much needed

Like
Reply
James A Lang

Co-founder at Kaze | Leading AI Solutions | STRIKE

7mo
See more comments

To view or add a comment, sign in

Explore topics