Replies: 1 comment 1 reply
-
Vulnerable Code Cannot Be Controlled By Adversary isn't really a justification. Its a superset which includes the rationale why the code cannot be controlled by an adversary, including the code is not in the execute path. There are multiple additional rationales why vulnerable code cannot be controlled by an adversary, including:
Any one of these CycloneDX justifications could prevent vulnerable code from being controlled by an adversary. CycloneDX justifications pre-date any official guidance or pseudo VEX specification from CISA. As you can see, CycloneDX is more granular in how it identifies justifications that could prevent vulnerable code from being executed by an adversary. Converting CycloneDX to any of the other VEX specs is fairly elementary as a result. Converting the other specs to CycloneDX can be challenging as those specs do not support the level of granularity that CycloneDX provides. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hey there, I have taken a closer look at the Minimum Requirements for VEX as published by CISA across the major VEX document standards. In that document CISA describe 5 different Status Justifications that should be set if a VEX statement is created with status Not Appliccable.
I have some difficulties clearly mapping the existing CycloneDX justification values to that scheme. Is there some official guidance of how this should be mapped? For context, I have read through the VEX Use Cases and the JSON spec.
Beta Was this translation helpful? Give feedback.
All reactions