VulnCheck are doing great work for us during the #NVD crisis
But what is next for us all in #infosec? Will the #CVE crisis of the last 20 years of #cybersecurity continue?
Patrick Garrity has been showing the best visualizations of this - but most of us know that CVE is barely a bucket of sand on a beach size scale of known #vulnerabilities
What "sources" should we as an industry trust? CISA? NVD? Private entities like VulnCheck who improve on the weaknesses of CISA and NVD?
What if I told you again that even these aren't really "sources" and are best described as metadata?
First of all NVD isn't even a source, it's clearly metadata on top of Mitre at best, and not even that lately. CISA vulnrichment will still NOT be a source once in full swing - it's also nothing more than metadata on top of Mitre
OSV is a database that aggregates sources of vuln data, it's the closest "source" that exists, CSA's GSD may come a close second, but not NVD or CISA which have no actual authoritative source, they just consumes Mitre sources, validate them, and add some extra properties
OSV is exponentially larger than NVD+CISA
NVD is like a grain of sand
OSV is a bucket of sand - on the beach of known vulnerabilities
In terms of "source" of what that beach is, such a source doesn't exist today
Known vulnerabilities are turned into a CVE less than 1 in 1M known vulns
You read that right, a CVE is less than 1 in 1M
The OSV shows that a CVE is maybe 1 in 100 of recorded vuln
The 1M comes from all the repos that create git commit saying they have fixed a security bug, that happens 10s of thousands of times a day in GitHub alone.
Then there are things that are exploitable which are not in GitHub or even source code at all; firmware, hardware, cloud, proprietary. - these are all known vuns too, because they are found in reports that are never "reported" to CVE
So I ask again, what source do we use? Who will try to build the first ever source of "known vulns"? Many have tried..