<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVSS (Common Vulnerability Scoring System) data in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32612#M2308</link>
    <description>&lt;P&gt;The CVSS helps me to have a perception of the threat landscape based on my knowledge of the organization assets. Without it, I cannot really have an idea of the business risk introduced by the vulnerabilities. However, I am sometimes disappointed when I cannot find some CVE IDs in the NVD database.&lt;/P&gt;</description>
    <pubDate>Mon, 10 Feb 2020 22:20:57 GMT</pubDate>
    <dc:creator>JoshuaGabriel</dc:creator>
    <dc:date>2020-02-10T22:20:57Z</dc:date>
    <item>
      <title>CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32386#M2245</link>
      <description>&lt;P&gt;The Common Vulnerability Scoring System (CVSS)&amp;nbsp;&lt;SPAN&gt;attempts to assign severity scores to vulnerabilities. For those who's interested to see what's going on, check out the &lt;A href="https://www.cvedetails.com/" target="_blank" rel="noopener"&gt;score report site&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 19:26:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32386#M2245</guid>
      <dc:creator>Chuxing</dc:creator>
      <dc:date>2020-02-05T19:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32390#M2246</link>
      <description>&lt;P&gt;Looks like it may be behind the curve.&amp;nbsp; Not a post for&amp;nbsp;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" target="_blank" rel="noopener"&gt;CVE-2020-0549&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 19:56:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32390#M2246</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-02-05T19:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32392#M2247</link>
      <description>&lt;P&gt;Intel has promised new microcode on patch Tuesday if I recall. You can trace much of this through the usual GitHub paths as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- b/eads&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 20:07:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32392#M2247</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-02-05T20:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32402#M2251</link>
      <description>&lt;P&gt;I know CVSS has been kind of turned to a de-facto standard to measure security vulnerability impact but even version 3 has been improved significantly, I do Not rely on it when it comes to risk assessment of vulnerabilities. for our firm it has been more like an isolated scoring system. it does not give you the real risk factor behind a security vulnerability and the reason is that I believe the context and dynamic of attack vectors change impact and severity often and makes an static scoring not quite useful. but that's just my opinion and the way we uniquely assess risk and score a vulnerability.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 22:17:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32402#M2251</guid>
      <dc:creator>Kaveh</dc:creator>
      <dc:date>2020-02-05T22:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32409#M2252</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/725605085"&gt;@Kaveh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;... it does not give you the real risk factor behind a security vulnerability and the reason is that I believe the context and dynamic of attack vectors change impact and severity often and makes an static scoring not quite useful.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The beauty of this forum is that you can voice a dissenting opinion, but you know what they say major wins. I would not go as far as saying the vulnerability scores in NVD are calculated in a vacuum, but some days it feels that way. CVSS scoring is robust, but I agree with you that it can be and should be improved - it is just way too qualitative and subjective to my liking. It is more art than science.&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/725605085"&gt;@Kaveh&lt;/a&gt;&amp;nbsp;how do you imagine taking into account the dynamic nature of threats? How could the calculator be improved?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 02:17:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32409#M2252</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-02-06T02:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32416#M2256</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;Some more comments on the CVSS scheme:&amp;nbsp; &lt;A href="https://securityintelligence.com/calling-into-question-the-cvss/" target="_blank"&gt;https://securityintelligence.com/calling-into-question-the-cvss/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree with &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"The three metric groups of the CVSS do not account for the risk posed based on the business value of an asset, nor were they ever supposed to. The CVSS is a severity rating, not a risk score. The environmental score can modify the base score by taking into consideration local mitigation factors and configuration details. It can also adjust the impact to an asset’s confidentiality, integrity and availability (CIA) if the vulnerability were exploited. However, it is still a measure of severity and does not consider the value of the exposed asset to the organization, which is a key risk factor."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 07:00:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32416#M2256</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-06T07:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32442#M2260</link>
      <description>&lt;P&gt;Many excellent points expressed here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVSS is quite subjective IMHO, but nonetheless a useful relative gauge with certain degree of 'common knowledge', thus serve a purpose. One of course cannot treat this as a sacrosanct religious standard.&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVSS has is applicable usefulness, sometimes easy to reference with non-technical, particularly management.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:55:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32442#M2260</guid>
      <dc:creator>Chuxing</dc:creator>
      <dc:date>2020-02-06T14:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32444#M2261</link>
      <description>&lt;P&gt;I use CVSS as a teaching tool to introduce the concepts to college students who otherwise may not have hands-on exposures to infosec exposures.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another useful visual tool for educating general public on infosec is the interactive graphical representation on reported security incidents (believe someone has posted before, but I am posting the link again):&lt;/P&gt;&lt;P&gt;&lt;A href="https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/" target="_blank"&gt;https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 15:03:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32444#M2261</guid>
      <dc:creator>Chuxing</dc:creator>
      <dc:date>2020-02-06T15:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32471#M2270</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;, I do agree CVSS is even more than robust, the indicators are artistic and as&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/323397747"&gt;@Chuxing&lt;/a&gt;&amp;nbsp;mentioned, it is a wonderful tool to teach the concept. However, it is not a metric for Risk as&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt; indicated, and that is my only problem with it.&lt;/P&gt;&lt;P&gt;after FIRST is so insisting in 3.1 that CVSS is really a severity score, I am thinking that we are the source of problem&amp;nbsp;&lt;img id="smileysurprised" class="emoticon emoticon-smileysurprised" src="https://community.isc2.org/i/smilies/16x16_smiley-surprised.png" alt="Smiley Surprised" title="Smiley Surprised" /&gt; I would blame Community in general that has tied CVSS strongly to vulnerability scanning and has forgot about assessment of a vulnerability in context of workflow and structure of an organization. Add to this misconception of ‘&lt;STRONG&gt;let’s mitigate Risks with higher CVSS score&lt;/STRONG&gt;’, and now CVSS is an integral part of vulnerability &lt;U&gt;assessment&lt;/U&gt; in every single popular &lt;U&gt;scanner&lt;/U&gt;. that tells me it is nothing wrong particularly with CVSS, I think FIRST even better stop adding more indicators to it, it is enough sophisticated &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt; what needs to be improved, in my humble opinion, is utilizing CVSS in right time right place.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 21:28:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32471#M2270</guid>
      <dc:creator>Kaveh</dc:creator>
      <dc:date>2020-02-06T21:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32474#M2271</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/725605085"&gt;@Kaveh&lt;/a&gt;&amp;nbsp;&amp;nbsp; My personal take, this is very dynamic and increasingly so.&amp;nbsp; We should be focused on intelligently patching systems, or putting in protective safeguards to at least mitigate the risk or potentially high risk that cyber criminals will be actively targeting various sectors or systems.&amp;nbsp; However, as we have seen recently, with the Citrix zero day, nothing is absolutely perfect.&amp;nbsp; As no one knew about it, until the perpetrator had already left their tools within the target networks, ready for a rainy day, in the hope no one had already blocked the entry point etc.&amp;nbsp;&amp;nbsp; If you have the associated collective collaboration and maturity to share information within respective industries, this may actually improve things or provide early warning without given away the game to the originator.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apply these with ethical AI and ML, may also speed up the reaction times, and early warning systems.&amp;nbsp; As you state, if you make a system too complex, no one will use it or it becomes next to useless or its actual meaning actually is lost over time.&amp;nbsp;&amp;nbsp; CVSS is a good baseline, but we need more, as the new attacks are invented or discovered as we progress.&amp;nbsp; Vulnerability management does need to be tailored to each and every organisation and its specific needs, there are always different structures, and ways to do things including business.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 22:33:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32474#M2271</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-06T22:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: CVSS (Common Vulnerability Scoring System) data</title>
      <link>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32612#M2308</link>
      <description>&lt;P&gt;The CVSS helps me to have a perception of the threat landscape based on my knowledge of the organization assets. Without it, I cannot really have an idea of the business risk introduced by the vulnerabilities. However, I am sometimes disappointed when I cannot find some CVE IDs in the NVD database.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 22:20:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/CVSS-Common-Vulnerability-Scoring-System-data/m-p/32612#M2308</guid>
      <dc:creator>JoshuaGabriel</dc:creator>
      <dc:date>2020-02-10T22:20:57Z</dc:date>
    </item>
  </channel>
</rss>

