Facing potential layoffs of at least 500 probationary employees, the National Institute of Standards and Technology (NIST) last week announced that it will defer all common vulnerabilities and exposures (CVEs) prior to Jan. 1, 2018.The move — while understandable given the Trump administrations moves to trim the federal workforce — raised some concerns in the cybersecurity community, mainly because many prolific cyber incidents took place based on exploits of older CVEs, most notably WannaCry, NotPetya, and Colonial Pipeline.Security researcher Patrick Garrity posted on LinkedIn that more than 94,000 CVEs issued prior to 2018 could be impacted, which is 34% of all total CVEs.According to the NIST release, the agency assigned this status to older CVEs to indicate that it does not plan to prioritize updating National Vulnerability Database (NVD) enrichment because of a CVEs' age. “We will continue to accept and review requests to update the metadata provided for these CVE records,” NIST said in the announcement. “Should any new information clearly indicate that an update to the enrichment data for the CVE is appropriate, we will continue to prioritize those requests as time and resources allow.”Marc Gaffan, chief executive officer of IONIX, said it’s understandable that NIST has been overwhelmed by the sheer volume of newly disclosed CVEs, and its primary focus should rightly be on the initial assessment of these vulnerabilities. However, Gaffan pointed out that the critical factor in evaluating any CVE is its exploitability.“With the rapid advancement of AI capabilities, there’s growing concern that older CVEs may be revived through novel exploitation techniques,” said Gaffan. “This trend could catch organizations off guard, leaving them unprepared to address the new risks and exposures these re-emerging threats may introduce.”Jon France, chief information security officer at ISC2, added there are limited resources and prioritizing the more recent vulnerabilities will likely result in protecting and informing a larger number of vulnerable organizations, allowing them to take steps to remediate or mitigate vulnerabilities.“On the other hand, there may be novel twists in older vulnerabilities that won’t be covered,” said France. “However, older vulnerabilities that are on the known exploited vulnerabilities KEV list will continue to be updated and worked on providing a measure of comfort. Keeping up-to-date with patches and latest versions of software has to be part of the equation.”Ted Miracco, chief executive officer at Approov, pointed out that just because a vulnerability is old doesn’t mean it’s irrelevant. In fact, Miracco said older vulnerabilities are often more dangerous because nation-states like China, Russia, Iran and North Korea have historically exploited outdated, but unpatched vulnerabilities years after publication. “They are most likely to be present in legacy systems still in production, particularly in critical infrastructure, government, medical and financial sectors,” said Miracco. “Security teams should look beyond CVSS scores and reference external enrichment sources such as MITRE CVE when validating patch status or threat mitigation. Map older CVEs to a software bill of materials (SBOM) to identify at-risk libraries/components.”
Vulnerability Management, Patch/Configuration Management, Governance, Risk and Compliance
NIST marks all CVEs prior to Jan. 1, 2018, as ‘deferred’

(Adobe Stock)
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds