Vulnerability Advisory Terminologies
2 min readNov 25, 2023
This story is about knowing what things should be in a vulnerability advisory and what we will understand from them about the vulnerability.
Glossary:-
- Title:- This will define the name of the vulnerability like:-
- Severity:- This will be defined and calculated based on vectors.
- Vector on the basis ( CVSS2.0/CVSS3.0):- This will based on multiple factors which we will understand in an individual topic that will be discussed in another story.
- Published Date:- The day on which vulnerability was publicly shared
- Last Modified Date:- As time passes, many changes will happen in vulnerability like the addition of exploits. So that day will be the last modified date.
- Description:- Detailed description of a vulnerability for understanding that will help you to analyze what and how can this vulnerability impact any asset or any flaw that this vulnerability can create.
- CVE IDs / CVE Dictionary Entry:- These will be released by MITRE or CVE IDs are primarily assigned by MITRE, as well as by authorized organizations known as CVE Numbering Authorities (CNAs).
- Weakness Enumeration:- IT basically defines the list of flaws that software /hardware have like:- buffer overflow etc. It is a form of registering software and hardware weaknesses and is controlled by the National Cyber Security Division and the US Department of Homeland Security.
- Affected products:- Which product and its version have this vulnerability?
- Fixed versions & products:- This will define which version and product has a patch or fix for this vulnerability.
- Reference links:- The portal on which this vulnerability is listed or Published like:- NVD, MITRE, Zero-day initiative, CVE.
- Vendor Name:- The name of the company/vendor that has owned or has a responsibility to release its fixed.
- Solution:- What do we have to do to mitigate the risk of the vulnerability in our environment or what action is required to patch this vulnerability?
TO BE CONTINUED
We will meet you in another story with something useful in cyber security.