-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Map products to CPE criteria, not only CPEs themselves #468
Comments
Yes, we would certainly benefit from that. However, beware that this increases the complexity of the whole matching thing. Just to note, the sec-certs/src/sec_certs/sample/cpe.py Lines 13 to 50 in d640ad1
|
I made an improvement on the site in this regard: |
Currently, when we are doing the CPE mapping, we are only mapping products to CPEs from the CPE dataset. However, when NIST issues CVEs, they sometimes specify the vulnerable configurations using criteria which specify configurations that do not match any actual CPEs in the CPE database, yet they contain basically almost all of the information that CPE contains.
Example
Take CVE-2024-45678 as an example. Here on the NIST page you can see the specified affected configurations. When you click on the "Show Matching CPEs" dropdown you will see that only 2 of the configurations actually have CPEs issued under them. However, for our purposes, the configurations specified themselves have a lot of information we could use to bind the CVE to an affected product: They have the vendor, the product, and some version range.
I do not have any numbers on the actual prevalence of this. We could run some numbers.
Implementation
Few things would need to be done to implement this:
sec-certs/src/sec_certs/utils/nvd_dataset_builder.py
Lines 344 to 353 in d640ad1
Wdyt, @adamjanovsky?
The text was updated successfully, but these errors were encountered: