Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2018

Haythem Elmir
0 1
Read Time1 Minute, 15 Second

A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.

This means that 7,900 security bugs remained without a CVE-2017-XXXXX number, and were left off the databases of many security scanners because of it.

Furthermore, this also means that many security bugs remained buried on forums and personal blogs —places where attackers might have the time to scout, but where many IT security departments will never look.

This isn’t the first time that MITRE’s Common Vulnerability Enumeration (CVE) and the DHS’ National Vulnerability Database (NVD) have fallen short of identifying and categorizing all security flaws during a year, something that’s becoming of a habit for the two organizations this past decade.

The reasons are plenty, but one of them is the explosion of security bugs in IoT devices, which has made it harder for Mitre and NVD staffs to keep up with all the bugs.

Furthermore, almost 7,000 2917 vulnerabilities received a RESERVED CVE status, with no public details available, despite 1,342 of them having a public disclosure. « This seems to indicate that MITRE is more focused on assigning and increasing the number of IDs, and not ensuring the quality of data, » RBS experts concluded.
To read the original article:

https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2018/

 

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Flight Sim Game Maker Embeds Password-Stealing Malware in Game Mod

Gamers are accusing a company that makes mods for Microsoft’s Flight Simulator X game of putting a password stealer inside one of its add-ons. The company defended its decision by saying the malware works part of a Digital Rights Management (DRM) platform and only activates when users are using a […]