CVE Board Meeting Notes

August 30, 2023 (9:00 am – 11:00 am EDT)
Agenda

·       9:00-9:05        Introduction

·       9:05-10:25      Topics

           *   Working Group Updates
           *   CVE (malicious) Link Rot Problem
           *   AI/ML Vulnerabilities

·       10:25-10:35    Open Discussion

·       10:35-10:55    Review of Action Items

·       10:55-11:00    Closing Remarks
New Action Items from Today’s Meeting
New Action Item
Responsible Party
Schedule a meeting to discuss the non-responsive domain reference problem in 
CVE Records. Include CNACWG, QWG, and AWG.
Secretariat
Reach out to Google to ask if they would present on their research into 
AI-driven fuzzing to automate CVE assignments.
Secretariat
Working Group Updates

  *   Automation Working Group (AWG)
     *   Provided technical guideline contributions to the Secretariat for the 
CVE Services guidance documentation.
     *   Engaged with the QWG on how to effectively support use of JSON 5 by 
downstream users.
     *   An ADP demonstration environment has been set up since June. CISA is 
using it and they have reported some initial results. The ADP references pilot 
is scheduled for delivery in late September.
  *   Outreach and Communications Working Group (OCWG)
     *   Published a Q2 CVE Program Summary blog and working on an “Our CVE 
story” blog with F5 (target publish date of mid to late September).
     *   In process with three podcasts: CVE JSON 5 records format; refresher 
of the popular Working Groups podcast (in the process of reaching out the 
chairs to schedule); another Roots podcast to reflect new Roots and their 
experiences.
     *   Have completed the scripted slides for the updated CVE introductory 
video on YouTube, and have revitalized the format. Working to streamline video 
updates going forward. Will be presented to the TWG on August 31, followed by 
review by the Board using the private email list.
  *   CNA Community Working Group (CNACWG)
     *   Have been working on the link rot effort (see next topic).
     *   Reached out to the current mentors and proteges to remind them that 
they are in the CNA mentor program and suggest screen sharing (i.e., Mentors 
shoulder-surfing to guide mentees through their initial CVE Record processing).
  *   Quality Working Group (QWG)
     *   Have cutover what is called a release candidate for schema micro 
release 5.01, and it is being tested. Going through some issues found. The 
5.0.1 release should not affect anyone's processes or any existing CVE Records.
     *   Working on a best practices guide for use of the schema for encoding 
things in a CVE Record.
     *   Question: Does the QWG have anything in backlog right now that would 
be appropriate for a major release? Answer: Yes, we have a bunch of things for 
a major release, e.g., changing the schema to stop allowing blank spaces before 
and after text field entries. A change like that takes planning and 
coordinating with the CNA community to implement.
     *   The Secretariat has prepared a related document draft CVE Services 
Guide that is being reviewed by the TWG.
  *   Strategic Planning Working Group (SPWG)
     *   Initial draft of the updated CNA Rules document is expected late 
September for an internal program review. The CNAs will then be asked to 
review. The program will adjudicate CNA comments and provide a version for 
Board review.
     *   After this update, will have a process to update the Rules more 
consistently, without having to do a major re-do.
  *   Tactical Working Group (TWG)
     *   Launched a CVE Program ‘Ideas and Suggestion’ board August 29 on 
GitHub<https://github.com/CVEProject/Ideas>; coordinated with AWG and OCWG.
     *   Also working on an article in Dark 
Reading<https://www.darkreading.com/> that describes the changes the CVE 
Program has made over the years and inviting the community of users to take 
advantage of the changes. Hope to have out in next couple of weeks.
  *   Vulnerability Conference Working Group (VCWG)
     *   The draft conference announcement is almost done. When final, the call 
for papers will be prepared and distributed.
     *   Next step for the charter is working group approval.
CVE (malicious) Link Rot Problem

  *   Presentation shared titled “CVE Reference Investigations.”

  *   CVE Record references have requirements, i.e., have to be good and 
accessible. This is not the case for many references.
  *   Recommendations to address this problem:
     *   QWG: Take up this issue, as dead domains directly impact CVE data 
quality. Should have some way to check that references are good when a CVE 
Record is submitted.
     *   AWG: Implement an on-the-spot archival procedure for references when 
CVEs are first submitted.
     *   CNACWG: Encourage CNAs to archive their references.
     *   Secretariat: Investigate the feasibility and impacts of hot swapping 
link destinations to archived sources.
  *   Secretariat will schedule a meeting to get into more detail about this 
problem. Include CNACWG, QWG and AWG chair or representative (action item).
AI/ML Vulnerabilities

  *   Guest speakers from NVIDIA and Microsoft shared their thoughts on AI/ML 
vulnerabilities
  *   Layers of an AI/ML-enabled application are application integration, 
framework, and ML model. Most ML attacks can be stopped at the application 
integration layer.
  *   In the ML model layer, vulnerability “poisoning” can occur during data 
collection/processing, training, or inference.
  *   Bad assumptions lead to flawed design, which can lead to vulnerabilities.
  *   Discussion: There may be lack of awareness in the CNA community that they 
can request a CVE ID for an AI/ML vulnerability today. The CNA Rules update 
will include clarification (e.g., demonstrative ML examples); additionally, 
other communications should be used to make it known more publicly.
  *   Some CVEs have been issued in this space, e.g., CVE ID 2019-20634, which 
is related to cloning machine learning model.
  *   Guests were amenable to further collaboration.
Open Discussion

  *   Google’s new automated AI-driven fuzzing project
     *   Google has plans to automate CVE assignments using AI fuzzing.
     *   The Secretariat will reach out to Google to ask if they would present 
to the Board on their research into AI-driven fuzzing to automate CVE 
assignments.
Review of Action Items
None.
Next CVE Board Meetings

·       Wednesday, September 13, 2:00pm – 4:00pm (EDT)

·       Wednesday, September 27, 2023, 9:00am – 11:00am (EDT)

·       Wednesday, October 11, 2023, 2:00pm – 4:00pm (EDT)

·       Wednesday, October 25, 2023, 9:00am – 11:00am (EDT)

·       Wednesday, November 8, 2023, 2:00pm – 4:00pm (EST)

·       Wednesday, November 22, 2023, 9:00am – 11:00am (EST)
Discussion Topics for Future Meetings

·       Sneak peak/review of annual report template SPWG is working on

·       Bulk download response from community about Reserved IDs

·       Finalize 2023 CVE Program priorities

·       CVE Services updates and website transition progress (as needed)

·       Working Group updates (every other meeting)

·       Council of Roots update (every other meeting)

·       Researcher Working Group proposal for Board review

·       Vision Paper and Annual Report

·       Secretariat review of all CNA scope statements

·       Proposed vote to allow CNAs to assign for insecure default 
configurations

·       CVE Communications Strategy



Reply via email to