Replies: 9 comments 8 replies
-
Hey @j--- I had noticed this till just now. It is very easy to pull CVSS vector strings. May be will do this once the open Bug tickets are fixed for the demo site. Vijay |
Beta Was this translation helpful? Give feedback.
-
/CCing my dayjob alterego, @jchestershopify. |
Beta Was this translation helpful? Give feedback.
-
@sei-vsarvepalli , let's handle the calculator engineering under #195 . This issue will be closed once the discussion of causal modes and the comparison to CVSS is handled in the PDF document / documentation. |
Beta Was this translation helpful? Give feedback.
-
I converted this from an issue #186 to a discussion because it is not clear what change(s) is/are needed. In particular, the causal model concept that @j--- mentions is unclear to me. While I am somewhat familiar with what Judea Pearl means by it, I'm missing a connection here. |
Beta Was this translation helpful? Give feedback.
-
So in my STS work, I would roughly equate "causal model" to "model of the mechanistic explanation of how the vulnerability leads to a successful attack". |
Beta Was this translation helpful? Give feedback.
-
If I had to pick a kind of causality I had in mind, it would be one of necessity and sufficiency. "These are the factors that must be true in order to achieve an exploitation" and "these factors being true alone mean an exploit is possible". But I didn't think of that explicitly, because I don't feel like I had a firm grasp on the structure of such a model for CVSS. It was more that CVSS has an unexamined or implicit such model in order to decide which factors to include or exclude; the same would go for SSVC. |
Beta Was this translation helpful? Give feedback.
-
The way that "necessary and sufficient" as the definition of causation gets problematized in the PhilSci literature is by asking the question "at what level of generality?". Necessary and sufficient for my specific machine today with me sitting at it will have different necessary and sufficient causes, in the details, because we may have ASLR that has put the vulnerable code in different memory locations and the attacker needs to know the memory location. They also might need to know our IP, and if I'm behind a NAT gateway, etc., and the specific necessary details are different across some very narrow level of generality. And then we have to ask "well how general is general enough to actually be useful but not so general as to be super vague?". That description, with some polish, should perhaps go in the SSVCv2.1 doc just because it explains where we currently are. However, there should be further discussion as to whether that is the right place for SSVC to be as far as it's underlying causal model and goals for how that model is used. |
Beta Was this translation helpful? Give feedback.
-
This is, for me at least, the most confusing discussion thread in this project (so far at least). I don't understand the initial point, nor do I understand the commentary that followed. As a result, I have no idea at all what the diff to the doc would look like that would resolve this thread. With no insult intended, it seems to me that if we have to appeal to PhilSci literature to explain why SSVC is simpler than CVSS then we've lost the plot. Are we overthinking this? Is this just the point that "You don't need a megabyte of input to adequately model a two-bit output?" |
Beta Was this translation helpful? Give feedback.
-
So, putting all my philosophy of science PhD aside. For the first, see https://en.wikipedia.org/wiki/Information_bias_(psychology) and https://en.wikipedia.org/wiki/Conjunction_fallacy and https://en.wikipedia.org/wiki/Precision_bias. There are also details about this in the PhilSci modeling literature if anyone cares, but these wikipedia summaries of common decision making errors are probably enough. For the second, for example, although Automatable is just a yes/no answer, it has four component questions for each kill chain stage. Although 4 yes/no questions is less than the number of options in CVSS v3 "Exploitability metric group" in the base score (with attack vector, user interaction, privileges required, and attack complexity being 432*2 options), they require a similar amount of work. It's just that SSVC has a strong claim on what is important (adversary can automate exploitation events). This makes the apparent options (yes/no) look more simple than the work it takes to get there (answer all four kill chain steps). (CVSS v4 adds more options to this group) This discussion could go in https://github.com/CERTCC/SSVC/blob/main/doc/md_src_files/03_representing_information.md, though I'm open to other options. |
Beta Was this translation helpful? Give feedback.
-
As raised by @jchester in his post:
I think it is possible that within the context of this paragraph, different stakeholders have different "causal models."
If that is the case, SSVC and CVSS are not directly comparable. I'd like to explore if this is a reasonable basis to understand the "causal model" idea, because I did not so much think of SSVC as having a causal model. And at least, insofar as it does, the "stakeholder specific" thing means I think it might have multiple.
I think this might suggest some changes to the visual display of the calculator, also. In the section of the paper that talks about relationship to other systems and CVSS specifically, we sketch how technical impact is related to the CVSS v3 impact metrics. That the post relates the CVSS impact metrics to mission impact and safety impact indicates we need to either message this better or change our minds. One way to message better would be to pull the CVSS vector string in for vuls that have one and use our suggested mapping to make a suggestion for the technical impact value.
@sei-vsarvepalli , how hard would it be to pull the CVSS vector string values for C/I/A impact and Scope if a user enters a CVE-ID into the calculator?
Beta Was this translation helpful? Give feedback.
All reactions