what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Not CVE Announcement

Not CVE Announcement
Posted Nov 13, 2023
Site notcve.org

The !CVE Project is an initiative to track and identify security issues that are not acknowledged by vendors but still are important for the security community.

tags | paper
SHA-256 | b048c73843bf5ec0efa0043743dba221a703c3a314b73dbc5a6b254795d5cb61

Not CVE Announcement

Change Mirror Download
=======
Mission
=======

The mission of !CVE (read not CVE) is to track, identify and provide a
common space for !vulnerabilities that are not acknowledged by vendors but
still are serious security issues.

This project was presented a few days ago at Black Hat Toronto 2023 [1]
and will also be presented next week at DeepSec 2023 [2].


===
Why
===

According to MITRE's CNA rules section 7.1:

"CNAs are left to their own discretion to determine whether
something is a vulnerability."[3]

This poses a clear conflict of interest, since the same vendor is the one
deciding whether or not an issue is a vulnerability and therefore whether a
CVE is assigned to their own product or not.


==============
What is a !CVE
==============

- A common place for !vulnerabilities (read not vulnerabilities)

- Security issues not covered by the traditional CVE.

- An identifier following common naming starting with an exclamation
mark(!) Example: !CVE-2023-0001


============================
How to request a new !CVE ID
============================

The !CVE Project is alive and assigning !CVE-IDs for security issues that
present an advantage for an attacker.

You can request a !CVE ID at: https://notcve.org/form.php


======================
How !CVEs are assigned
======================

A panel will review !CVE requests and if qualifies, a new !CVE number will
be assigned and details will be publicly available.


==============================
How to access to !CVEs details
==============================

Using the search engine at https://notcve.org or a direct link to the !CVE
entry. For example, the first ever !CVE is available at:
https://notcve.org/view.php?id=!CVE-2023-0001


The search engine combines information from multiple sources and also
searches for regular CVEs in all fields from all sources. For example to
search by credit we can obtain CVE discovered by Google Project Zero:

https://notcve.org/search.php?query=Google+Project+Zero


=========================
What qualifies for a !CVE
=========================

Examples that qualifies for a !CVE:
-----------------------------------
- A security issues that is not acknowledged by the vendor as a
vulnerability.

- A security issue acknowledged by a vendor as technically correct
but outside their threat model.

- A notified security issue that has not been assigned a CVE after
90 days.

- A published security issue without an assigned CVE.

Examples that do NOT qualify for a !CVE:
----------------------------------------
- A software defect with no impact on security.

- A generic security issue, you need to list one or more
devices/software affected with your finding.

- Well known attacks to unencrypted channels to obtain
credentials: Telnet, FTP, etc.

- You can read the FAQ [4] for more examples.



In short, we see the !CVE Project as a great initiative to track and
identify security issues that are not acknowledged by vendors but still are
important for the security community.


==========
References
==========

[1]
https://www.blackhat.com/sector/2023/arsenal/schedule/index.html#cve-a-new-platform-for-unacknowledged-cybersecurity-vulnerabilities-36144

[2] https://www.deepsec.net/speaker.html#PSLOT667

[3] https://cve.mitre.org/cve/cna/CNA_Rules_v3.0.pdf

[4] https://notcve.org/faq.html




---
!CVE Team

[ A PGP key is available for encrypted communications at
https://notcve.org/contact.html ]
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close