|
||||
IMPORTANT : This page has been archived. Please see the Researcher Reservation Guidelines for the most current information.
This document provides information on how to reserve a CVE ID (s) before publicizing a new vulnerability so that CVE IDs can be included in the initial public announcement of the vulnerability and can be used to track vulnerabilities.
Some important things to note:
Appendix A:
Documents on Disclosure Practices
Appendix B:
Determining if CVE IDs Are Needed
Appendix C:
PGP Key
The basic process for reserving a CVE ID is as follows:
CVE IDs are currently only assigned to vulnerabilities that are going to be publicly announced.
You should make a good faith effort to notify the affected vendor and work with them to ensure that a patch is available prior to publicly disclosing the vulnerability. Information is more accurate and complete when researchers and vendors work together. This practice also reduces the likelihood of a duplicate CVE ID being issued, which can happen when both a researcher and vendor request CVE IDs.
Without independent confirmation or vendor acknowledgement, it may not be possible to determine if the vulnerability is real, which could result in a request for a CVE ID being denied.
There are several documents that provide guidelines on disclosure. See Appendix A: Documents on Disclosure Practices for more details.
In general, you should do the following:
a) Work with the vendor to explain the problem, conduct further analysis if necessary, test any patches that the vendor proposes, and ensure the accuracy of both your, and the vendor's, advisory.
When possible, do not announce a vulnerability until the vendor has provided a patch. This could take between one day and six months, depending on the vendor and the nature of the problem. If you believe that the issue is urgent and the vendor is not responding quickly enough, try using a coordinator as described in Step 4 below. Also, you should avoid releasing precise details of the vulnerability until system administrators have time to apply the patch.
Software vendors participating as CNAs assign CVE IDs for their own products.
If the vulnerability is related to a CNA product, contact the appropriate CNA organization directly. If the request is accepted, the organization will assign a CVE ID for the issue and include it in its initial public announcement.
If a CVE ID cannot be requested through a CNA, consider contacting a third party coordinator such as an emergency response or vulnerability analysis team (e.g., CERT/CC), especially when there are problems in contacting the affected vendor.
If you are unable to obtain a CVE ID via the methods cited above, you may request a CVE ID directly from MITRE using MITRE's CVE Request web form (view guidance ). Complete the "Request a CVE ID" web form.
Determine if the affected product is within the scope of MITRE as a CNA by checking Products Covered . If a product is not within scope, it may not be issued a CVE ID by the MITRE CVE Assignment Team.
As an exception, the MITRE CVE Assignment Team assigns CVE IDs for products that have been packaged by a Linux distribution on our Product List, such as Debian or Fedora. It is not necessary for the specific product name to be listed on the Product List.
CVE IDs are not assigned by the MITRE CVE Assignment Team for software that may be optionally added to a listed product, such as a third-party plugin or module. For example, CVE IDs are assigned for the WordPress core product, but not for any WordPress plugin. CVE IDs are also not assigned for Android or iOS apps unless the app's author is a listed vendor.
In addition, the MITRE CVE Assignment Team assigns CVE IDs for a number of programming languages including Python and PHP, but not for all code written in those languages. As an example, CVE IDs are not assigned for a web application written in PHP, unless the product or vendor is separately listed.
The "Request a CVE ID" selection on MITRE's CVE Request web form requires the following information:
The required information is the minimum information required to request a CVE ID. However, you can also provide optional information which can be used to provide additional detail for your CVE ID request and may be valuable to creating the CVE entry as well as for downstream consumers.
Optional information includes:
Upon completion of the CVE Request web form, the requestor will receive a confirmation email that the request was received and a reference number. If you need to communicate with MITRE about this request, reply to the confirmation email without changing the subject line, as it contains the reference number associated with your request.
If you do not seem to have received a confirmation email, please check your spam folder.
If MITRE requires any additional clarification, they will contact the requester via email, referencing the confirmation number for the submitted CVE Request.
Once there is enough information to confirm the vulnerability exists and that it affects a covered product, the MITRE CVE Assignment Team will reply to the requester with a CVE ID. The CVE ID is considered "reserved" at this stage. Descriptions with details of the vulnerability will only be added when the vulnerability is made public (see step 12).
If the vulnerability is not confirmed, or if it is not in a covered product, a CVE ID request may be rejected. In this case, the requester will receive a response from the MITRE CVE Assignment Team notifying them of the decision.
Once a CVE ID is obtained, provide it to all affected vendors and other parties (such as CERT/CC) with whom you are communicating. This makes it easier to share information about the vulnerability and reduces the risk that different parties may assign different CVE IDs to the same vulnerability.
When publishing a vulnerability with an associated CVE ID, include the CVE ID in the announcement. Announcements containing multiple CVE IDs should delineate which CVE ID is associated with which vulnerability.
The following information may be contained in the vulnerability announcement:
Some tips:
After your announcement has been publicized, contact the MITRE CVE Assignment Team by either replying to the original email discussion or via the CVE Request web form . If you submit a new form, select "Notify CVE about a publication" and provide the following information:
Until this information is provided to MITRE, only a reserved CVE entry may be recorded on the CVE web site. No description or details of the vulnerability will be made available in the CVE entry until the vulnerability has been publicized.
When notified of a publication, MITRE will then populate the CVE entry with a description and references. This information will be made available on the CVE List .
The CVE information will also be updated in the U.S. National Vulnerability Database (NVD) .
The following documents describe processes and provide guidelines for coordinated vulnerability disclosure practices.
There are several factors to consider to determine whether one or more vulnerabilities require a CVE ID when providing information to MITRE:
A. Duplicates
Duplicates may be found by searching the MITRE CVE website and also by general web searches. Also, if a researcher previously contacted another organization on the CNA list about a vulnerability, a CVE ID assignment may already exist. The vulnerability should not be duplicated by the assignment of two CVE IDs.
B. Origination
CVE IDs are assigned to issues for which the primary method of addressing the vulnerability is for the vendor to take an action to remediate the vulnerability in their product. CVE IDs are not for cases in which the primary method of addressing the vulnerability is for an action to be taken by the operator of a single website or online service.
C. Establishing a policy violation
CVE IDs are needed when the vendor agrees that the observed product behavior violates a security policy, such as an unintended loss of confidentiality, integrity, or availability. CVE IDs are not for cases in which a reporter unilaterally believes that product hardening is desirable, such as a different approach to abuse prevention, or a different display of security-relevant data.
D. Establishing whether the vulnerabilities differ
In cases of multiple findings reported at the same time for a single product, separate CVE IDs are sometimes needed when there is a difference in the primary vulnerability types or affected versions.
E. Cross-vendor coordination
Separate CVE IDs are not assigned solely because vulnerable code is shipped in more than one product. Particularly in the case of open-source software, it is common for multiple vendors to use the same CVE ID in any scenario in which they have bundled, repackaged, or copied a piece of vulnerable code.
You may encrypt any post-web form communications using PGP or GnuPG (gpg), with the Primary CNA's PGP key , which can be downloaded from various PGP key servers.