TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Replacing CVE

59 pointsby gavinhoward27 days ago

13 comments

parliament3227 days ago
&gt; First of all, a linear “score” like CVSS just cannot work in cybersecurity. Instead, we should have a system on the attributes of a vulnerability.<p>This is exactly what CVSS is: a scoring system based on attributes.<p>&gt; In the first category, we might have attributes such as: Needs physical access to the machine, Needs to have software running on the same machine, even if in a VM, Needs to run in the same VM.<p>This is exactly what the AV vector in CVSS is.<p>&gt; In the second category, we might have attributes such as: Arbitrary execution, Data corruption (loss of integrity), Data exfiltration (loss of confidentiality).<p>This is exactly what impact metrics in CVSS are.<p>I fear the author has a severe misunderstanding of what CVSS is and where the scores come from. There&#x27;s even an entire CVSS adjustment section for how to modify a score based on your specific environment. I&#x27;d recommend playing around with the calculator a little to understand how the scores work better: <a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln-metrics&#x2F;cvss&#x2F;v3-calculator" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln-metrics&#x2F;cvss&#x2F;v3-calculator</a>
评论 #43710900 未加载
评论 #43715080 未加载
1970-01-0127 days ago
Less than 24 hrs into it, and now we have two problems from this defunding fiasco:<p>All the original problems that exist within CVE.<p>&quot;Let&#x27;s just reinvent the wheel!&quot;<p>Yes, you have a dev background, which entitles you to an opinion, and you also have good intentions. This road is noble. However, the crux of this disaster is not technical, it&#x27;s political. Maybe reinventing the wheel will be a huge success. Maybe it can wear the crown of free and open source for a while. But it&#x27;s much more likely this fails as things become difficult to maintain, and you become tired, or poor, and are forced to stop, with nobody, or even worse, an enemy (this is an internationally critical database) controlling the database. So let&#x27;s focus on solving the original funding disaster without jumping to forking and fracturing as a knee-jerk solution.
评论 #43709751 未加载
评论 #43709712 未加载
jabiko27 days ago
So if I understand it correctly, the blog author proposes to create a professional certification, require companies that produce software to have at least one of this certified individuals be responsible for reporting vulnerabilities of the companies software, complete with creating authorities that issue such certifications, training and also compliance enforcement.<p>And all this to fix a broken CVE system? I assume that the friction this generates has a bigger negative impact on the overall ecosystem than the non-optimal CVE system that exists right now.
评论 #43709361 未加载
VyseofArcadia27 days ago
I feel like requiring software &quot;engineers&quot; to be actual capital E Engineers would fix a lot of problems in our industry. You can&#x27;t build even a small bridge without a PE, because what if a handful of people get hurt? But on the other hand your software that could cause harm to millions by leaking their private info, sure, whatever, some dork fresh out of college is good enough for that.<p>And in the current economic climate, even principled and diligent SEs might be knowingly putting out broken software because the bossman said the deadline is the end of the month, and if I object, he&#x27;ll find someone who won&#x27;t. But if SEs were PEs, they suddenly have standing, and indeed obligation, to push back on insecure software and practices.<p>While requiring SEs to be PEs would fix some problems, I&#x27;m sure it would also cause some new ones. But to me, a world where engineers have the teeth to push back against unreasonable or bad requirements sounds fairly utopian.
评论 #43710016 未加载
评论 #43710010 未加载
评论 #43709905 未加载
评论 #43710011 未加载
评论 #43709912 未加载
ziddoap27 days ago
&gt;<i>&quot;So yes, I get it: we shouldn’t trust companies, or even FOSS projects, to self-report.<p>Unless…what if we made penalties so large for not reporting, and for getting it wrong, that they would fall over themselves to do so?&quot;</i><p>We know this doesn&#x27;t work, and author admits as much.<p>However, the proposed solution is to add another cert into the mix. But it&#x27;s not clear how this designation would be applied globally, with agreement across the globe on the requirements, punishments, etc. Not to be rude to the author, but it sort of seems like they forgot that not all software is developed in the US. (Not to mention, I really don&#x27;t want <i>another</i> cert)
评论 #43709277 未加载
评论 #43709327 未加载
grayhatter27 days ago
&gt; This idea I had months ago will surely fix all the problems I just started thinking about today.<p>I very rarely find myself agreeing with some take the author has made. To the point where I almost said never agree. But I always read though, because even though the suggestion is always surface level, it&#x27;s also always well written and well expressed. I like the help in reasoning through my own thoughts, and his musings always give a good place to start explaining and correcting from.<p>I hate, with a passion, CVE farmers. Because sa much of it is noise these days. But everyone complaining^1 so far have all completly missed the forest for the trees. The reason everyone uses CVEs still is because the value from having a CVE was never to know the severity. (The difference between unauthenticated remote arbitrary code execution, and might create a partial denial of service in some rare and crafted cases, is 9.9 and 9.3) The value has always been the complete lack of ambiguity when discussing some defect with a security implication. You don&#x27;t really understand something if you can&#x27;t explain it, you can explain it if you don&#x27;t have the words or names for it. CVE farming is a problem, but everyone uses CVEs because it makes defects easier to understand and talk about without misunderstandings or miscommunication.<p>I&#x27;d love to see whatever replaces CVEs included a super set, where CVEs, also have CRE, where Vulnerability is replaced by Risk and only when [handwavey answer about project owner agreement], which would ideally preserve the value we get from the current system. But would allow the incremental improvement suggested by the original comment this essay is responding to. I would like my CVEs to be exclusively vulns that are significant. But even more than I want that, I don&#x27;t want to have to argue about where the bar for significant belongs!<p>No company <i>wants</i> to manage CVEs, there&#x27;s nothing that&#x27;s going to meaningfully change that in the short term. Which means no one is looking for a better CVE system. Everybody wants the devil they know, I have complaints about the CVE system. But don&#x27;t want to try to replace it without accounting for how it&#x27;s used, in addition to how it works (and breaks).<p>1^: it&#x27;s still early, and the people rushing to post are often only looking at the surface level. I&#x27;m excited to hear deeper more reasoned thoughts, but that&#x27;s likely to take more than just 24h
dang27 days ago
Related ongoing threads:<p><i>CVE Foundation</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43704430">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43704430</a><p><i>CVE program faces swift end after DHS fails to renew contract [fixed]</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43700607">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43700607</a>
beambot27 days ago
Funding to Mitre&#x27;s CVE was just reinstated:<p><a href="https:&#x2F;&#x2F;www.forbes.com&#x2F;sites&#x2F;kateoflahertyuk&#x2F;2025&#x2F;04&#x2F;16&#x2F;cve-program-funding-cut-what-it-means-and-what-to-do-next&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.forbes.com&#x2F;sites&#x2F;kateoflahertyuk&#x2F;2025&#x2F;04&#x2F;16&#x2F;cve-...</a>
kissgyorgy27 days ago
You can&#x27;t solve people problems with technology.
评论 #43709848 未加载
rc_mob26 days ago
Oh gosh that was an interesting read. Became a fan of the author and his irreverence in reading this.
moktonar27 days ago
I think it might be time for an OpenCVE...
marcusb27 days ago
I tried to read this with an open mind, but I think the poster is talking about a lot of problems that are adjacent to CVE (coordinated vulnerability disclosure and vulnerability scoring, primarily) while missing the primary value that CVE provides (a consistent vocabulary to talk about vulnerabilities and a centralized clearing house for distributing vulnerability data) and as a result their proposed solution misses the mark.<p>The article quotes a lobsters post approvingly:<p><pre><code> 1. We end up with a system like CVE where submitters are in charge of what’s in the database other than egregious cases. This is what MITRE supported as the default unless someone became a CNA, something they’ve been handing out much more freely over the last few years to address public scrutiny. 2. We end up with a system not like CVE where vendors are in charge of what’s a vulnerability. This seems to be what Daniel and others want. </code></pre> I guess the first problem with this is that the CNA system very much puts vendors in de facto control of what goes in the database. But, this description of CVE-like systems is missing the forest for the trees, in that the alternative to CVE is not one of the two scenarios described, but the wild-west situation that existed before CVE, where vulnerability info came from CERT, from Bugtraq&#x2F;Full Disclosure&#x2F;etc., and from vendors, often using wildly different language to describe the same thing.<p>The whitepaper[0] that led to the CVE system described a pretty typical scenario:<p><pre><code> Consider the problem of naming vulnerabilities in a consistent fashion. For example, one vulnerability discovered in 1991 allowed unauthorized access to NFS file systems via guessable file handles. In the ISS X-Force Database, this vulnerability is labeled nfs-&gt; guess [8]; in CyberCop Scanner 2.4, it is called NFS file handle guessing check [10]; and the same vulnerability is identified (along with other vulnerabilities) in CERT Advisory CA-91.21, which is titled SunOS NFS Jumbo and fsirand Patches [3]. In order to ensure that the same vulnerability is being referenced in each of these sources, we have to rely on our own expertise and manually correlate them by reading descriptive text, which can be vague and&#x2F;or voluminous. </code></pre> That, and a central clearing house, are what is at stake if a system like CVE disappears, and I fail to see how any professional licensing scheme -- unless the licensing body replicated the CVE system or something like it -- would do anything to address that.<p>parliament32&#x27;s comment in this thread perfectly addresses the issues with the articles treatment of CVSS, so I&#x27;ll not rehash that here, other than to say that the actual score output of CVSS is bad and the people who designed it should feel bad.<p>0 - <a href="https:&#x2F;&#x2F;www.cve.org&#x2F;Resources&#x2F;General&#x2F;Towards-a-Common-Enumeration-of-Vulnerabilities.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cve.org&#x2F;Resources&#x2F;General&#x2F;Towards-a-Common-Enume...</a>
meindnoch27 days ago
In the age of Rust, I wonder if CVE is even necessary anymore.
评论 #43709584 未加载
评论 #43709756 未加载
评论 #43713126 未加载