Skip to content

Latest commit

 

History

History
56 lines (33 loc) · 5.8 KB

VEX_VDR.md

File metadata and controls

56 lines (33 loc) · 5.8 KB

Unconfusing VEX and VDR (and VAR)

Last update: 2024-12-09
[email protected]

Summary

Vulnerability Exploitability eXchange (VEX) and Vulnerability Disclosure Reports (VDR) are similar concepts that are sometimes conflated or confused. While both concepts are in relatively early stages of development and implementation, VEX is more clearly defined and has a more substantial history.

In the November 2024 upate to NIST SP 800-161r1, it appears that VDR has been redefined as a "vulnerability advisory report" or VAR:

vulnerability advisory report Publication by a technology developer and/or provider to customers or the general public that describes a vulnerability with a focus on remediation and mitigation. [ISOIEC29147, adapted]

The word "report" seems redundant. Otherwiswe VAR makes sense, it's a vulnerability advisory that suppliers (providers, vendors, developers) publish or share with users to provide (ideally detection, remediation, mitigation) information about vulnerabilities.

While the rest of this document aging, VEX is still about vulnerability status and VAR is still a higher level concept. In general, a VAR could contain VEX, as done in the CSAF VEX profile.

VDR defined

NIST SP 800-161r1

The concept of a Vulnerability Disclosure Report (VDR) appears to have been first introduced in NIST SP 800-161r1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. The final version of this SP was published in May 2022 and "VDR" does not appear in previous drafts. VDR is defined in Appendix A: C-SCRM Security Controls in the Risk Assessment family under RA-5 Vulnerability Monitoring and Scanning. Appendix A provides "Supplemental C-SCRM Guidance" to some of the controls defined in NIST SP 800-53, Rev. 5:

This section is structured as an enhanced overlay of [NIST SP 800-53, Rev. 5]. It identifies and augments C-SCRM-related controls with additional supplemental guidance and provides new controls as appropriate.

VDR is described in SP 800-161r1, RA-5, page 132:

Enterprises, where applicable and appropriate, may consider providing customers with a Vulnerability Disclosure Report (VDR) to demonstrate proper and complete vulnerability assessments for components listed in SBOMs. The VDR should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component or product. The VDR should also contain information on plans to address the CVE. Enterprises should consider publishing the VDR within a secure portal available to customers and signing the VDR with a trusted, verifiable, private key that includes a timestamp indicating the date and time of the VDR signature and associated VDR. Enterprises should also consider establishing a separate notification channel for customers in cases where vulnerabilities arise that are not disclosed in the VDR. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors.

RA-5 refers departments and agencies to Appendix F for additional guidance on EO 14028. Appendix F in turn refers to NIST’s dedicated EO 14028 web-based portal. Neither "vulnerability disclosure report" nor "VDR" appear in these sources.

NIST SP 800-216

"Vulnerability disclosure report" language (but not the VDR acronym) also appears in NIST SP 800-216] Recommendations for Federal Vulnerability Disclosure Guidelines published in May 2023. In NIST SP 800-216, "vulnerability disclosure report" describes an incoming report to the Federal Coordination Body (FCB) or a department or agency's Vulnerability Disclosure Program Office (VDPO). This is different than the NIST SP 800-161r1 description of a VDR as a "...proper and complete vulnerability assessments for components listed in SBOMs."

VEX defined

From Vulnerability-Exploitability eXchange (VEX) – An Overview published in September 2021:

The primary use cases for VEX are to provide users (e.g., operators, developers, and services providers) additional information on whether a product is impacted by a specific vulnerability in an included component and, if affected, whether there are actions recommended to remediate.

From Minimum Requirements for Vulnerability Exploitability eXchange (VEX) published in April 2023:

Vulnerability Exploitability eXchange (VEX) indicates the status of a software product or component with respect to a vulnerability. A common VEX use case is to indicate that software is or is not affected by a vulnerability.

VEX and VDR together

Taking the NIST SP 800-161r1 definition of VDR, it seems reasonable that a VDR could consist of a set of VEX documents and statements.

VDR is sometimes described as providing postive acknowledgement that software is affected by a vulnerability, contrasted with VEX asserting that software is not affected by a vulnerability. VEX can convey that software is or is not affected by a vulnerability. From Minimum Requirements:

[status] MUST be one of the following values, some of which have further requirements:

  • Not affected (“not_affected”)
  • Affected (“affected”)
  • Fixed (“fixed”)
  • Under investigation (“under_investigation”)