Red Hat Product Security rates the severity of security issues found in Red Hat products using a four-point scale: Low, Moderate, Important, and Critical, as well as includes a separate Common Vulnerability Scoring System (CVSS) base score.
The CVSS rating is not used to determine the priority with which flaws are fixed or to determine the severity rating of the vulnerability. It is used as a guideline to identify and describe key metrics of a flaw and is meant to help customers prioritize the order in which they remediate flaws. CVSS scoring is used by other agencies, which sometimes tend to score these flaws in a different way.
The National Vulnerability Database (NVD) is a U.S. Government repository of vulnerability management data that includes databases of security checklists, security related software flaws, and impact metrics. NVD analysts calculate CVSS v3.1 score for each security issue and then apply the CVSS qualitative rating scale (Low, Medium,High or Critical) automatically based on the scoring.
For open source software shipped by multiple vendors, the CVSS base scores may vary for each vendor depending on the way the product is shipped in their platform, how it's compiled, and what configuration options are enabled by default. However NVD provides a single CVSS base score, which is product agnostic and sometimes, based on the above conditions, may differ largely from the scoring done by Red Hat for our products for the same security flaw.
Generally, we believe that Red Hat CVSS scoring is more accurate than the NVD score mainly for the following reasons:
-
Deeper Technical analysis of security issues: Most of the security flaws are deeply analyzed by security analysts at Red Hat. The more severe the potential impact, the more time spent on analyzing the flaw. Because of this, Red Hat often has a better understanding of risks and impacts associated with security flaws that affect its products.
-
Early access to flaw details: Some security flaws are reported directly to Red Hat by security researchers or users who discover the flaw. Security analysts at Red Hat are members of upstream security groups and projects and, therefore, typically work on security issues well before they are announced. Earlier access allows a thorough investigation, which helps Red Hat to have more information to develop CVSS metrics upon disclosure, as it pertains to the use of components in our products.
-
NVD focuses on the flaw as a worst-case in the broadest sense, regardless of compilation options or the operating system. Red Hat, on the other hand, individually scores the component based on the product it is used in and how it is built. This scoring means that in some cases, for example where a component is used in a very limited sense, it could have a lower CVSS score due to lower exposure (e.g. in Red Hat OpenShift) versus a more general or unknown exposure that is dependent on the customer's use (such as Red Hat Enterprise Linux). We note deviations in score and metrics, per-product, on the CVE page.
Based on customer requests and taking the above information under consideration, Red Hat Product Security has begun a feedback loop process for security flaws that we feel have not been rated correctly by NVD. In cases where NVD agreed with our analysis, the scores were corrected and updated on the NVD web pages. Red Hat Product Security started this process as of 2020. For the last six months from April 14 to October 14, out of the 311 requests submitted to NVD for rescoring, 40% were accepted, 12% were rejected and 48% are still pending review.
Our improved security pages provide a detailed description of why our scoring is different to help customers understand their risk to that particular flaw. This detailed description helps to understand cases where the difference between the NVD and Red Hat scoring vastly differs based on the way NVD scores on specific ways that the software was compiled, configured, or shipped.
Overall our customers have told us that the CVSS re-score process with NVD has proven to be quite useful. They now better understand the impact and risks associated with security issues, based on how a specific component is consumed in the product they use. It’s also helpful to the community, in general, as we strive to release as much of our research results as possible for the public’s consumption.
[Editor's note: Updated on October 14, 2020 for clarity.]
저자 소개
Huzaifa Sidhpurwala is a Senior Principal Product Security Engineer - AI security, safety and trustworthiness, working for Red Hat Product Security Team.
유사한 검색 결과
Red Hat to acquire Chatterbox Labs: Frequently Asked Questions
Attestation vs. integrity in a zero-trust world
What Is Product Security? | Compiler
Technically Speaking | Security for the AI supply chain
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래