The CVE or Common Vulnerabilitiesand Exposuressystem was launched in 1999 by the MITRE Corporation, a non-profit organization which manages several cybersecurity programs on behalf of the US government. The main aim of the CVE project was to create a standardized repository for tracking and documenting vulnerabilities on a consistent global scale.
Prior to the creation of CVE, there was no universal way of naming and tracking vulnerabilities. Different security vendors used their own nomenclatures, making communication and coordination difficult. MITRE therefore proposed a :
For example: CVE-2023-12345 - _2023_: The year in which the vulnerability was discovered or registered. - _12345_: A unique sequential number for this vulnerability.
CVSS : Vulnerability severity assessment
The Common Vulnerability Scoring System (CVSS) is a standard that often accompanies CVEs. It provides a numerical rating from 0 to 10 to indicate the severity of a vulnerability, enabling companies to prioritize their risk management.
To arrive at this score, three main metrics are used:
A CVSS is divided into several components to give a complete vulnerability assessment:
Interpreting CVSS scores
- 0.0 - 3.9 : Low: Minor risk, less urgent correction.
- 4.0 - 6.9 : Medium: Moderate risk, needs prompt attention.
- 7.0 - 8.9 : High: Serious risk, high priority.
- 9.0 - 10.0: Critical: Major vulnerability, must be corrected immediately.
Common Platform Enumeration (CPE) is another standard often associated with CVEs. It provides a uniform method for identifying products, software and systems affected by a vulnerability.
Structure of a CPE
A CPE identifier follows a precise structure, as a kind of unique address for a specific piece of software or hardware:
```cpe:2.3:o:vendor:product:version:update:edition:language ````
Each section describes a particular aspect of the system: - Vendor: The supplier (e.g. Microsoft). - Product: The product or software concerned (e.g. Windows). - Version: The vulnerable version (e.g. 10.0.19044). - Update, Edition, Language: Additional details if required.
Practical example: For a vulnerability in Apache HTTP Server version 2.4.56, the associated CPE might look like this:
cpe:2.3:a:apache:http_server:2.4.56:::::::*````
The benefits of CPEs - Precise identification: to determine whether a specific system is vulnerable. - Automated security audits: Scanning tools such as Nmap, Nessus or OpenVAS use CPEs to automatically check whether an infrastructure is exposed to specific CVEs.
CVSS analysis of CVE-2019-0708
The attack vector is identified as: ```CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ````
This corresponds to: !Screenshot 2025-01-23 at 16.39.58 1.png
Case study: CVE-2019-0708 management in a company
Step 1: Identify vulnerable systems
The IT team conducts a system audit to identify vulnerable Windows versions. Tools such as Nmap, OpenVAS or Nessus can be used to identify hosts with RDP enabled and unpatched. Corresponding CPEs include :
``` cpe:2.3:o:microsoft:windows_7:::::::: cpe:2.3:o:microsoft:windows_xp:::::::: ````
Step 2: Prioritization with the Environmental Score In the company's specific environment: - Confidentiality: Medium The systems concerned store moderately sensitive internal data. - Integrity: None All data is permanently backed up. - Availability: High RDP unavailability would affect the continuity of remote operations for several teams.
After environmental adjusted score: 7.8 (high)
Step 3: Implement solutions 1. Security patch - Microsoft has released updates for affected systems, even for obsolete versions such as Windows XP. These patches should be applied immediately. 2. Workarounds - Disable RDP on non-essential systems. - Set up firewall rules to restrict RDP connections to trusted IP addresses only. - Enable NLA (Network Level Authentication) to add a layer of security. 3. Access monitoring and management - Continuous monitoring of RDP connections via SIEM solutions. - Set up VPNs to further secure remote connections.
Step 4: Exploitation response plan If signs of BlueKeep exploitation are detected (increased RDP connection attempts, abnormal behavior), the company must: - Immediately isolate infected systems. - Analyze machine logs to identify the origin of the attack. - Restore systems from secure backups.