All,
I enjoyed these definitions and the opportunity to provide input. My thoughts 
are below.


  *   Weakness - A flaw or defect overlooked during a product lifecycle that, 
under the right conditions, could contribute to the introduction or exploit of 
vulnerabilities in a range of products made by different vendors, not limited 
to software
  *   Attack Pattern - The common approach and attributes related to the 
exploitation of a weakness or vulnerability, primarily in software, by 
extension in computer hardware and business logic

Thanks,
Ed

Edwin Covert, CISSP-ISSAP, CISM, CRISC, SCF, PMP
Director, Risk Assessments and Testing - WarnerMedia
Kristy McCormac<mailto:kristy.mccor...@warnerbros.com> manages my calendar

818-977-4769
wbd.com

[Warner Bros. Discovery]

Public Key gpg --search-keys --keyserver keys.openpgp.org 
ed.cov...@warnerbros.com<mailto:ed.cov...@warnerbros.com>

Please note: While I may send an email outside of traditional working hours, I 
do NOT expect a response outside of your own.

From: Gutman, Gregoriy (CTR) <gregoriy.gut...@associates.fema.dhs.gov>
Date: Friday, July 15, 2022 at 7:20 AM
To: Alec J Summers <asumm...@mitre.org>, CAPEC Researcher Discussion 
<capec-research-list@mitre.org>
Subject: RE: CWE/CAPEC Definitions
[CAUTION]
This email originated outside Warner Bros.

Hello Alec, et al,

Here is my attempt at definition improvement of weakness and attack pattern.

Weakness - A flaw or defect overlooked during a product lifecycle that, under 
the right conditions, could contribute to the introduction or exploit of 
vulnerabilities in a range of products made by different vendors, not limited 
to software

Attack Pattern - The common approach and attributes related to the exploitation 
of a weakness, primarily in software, by extension in computer hardware and 
business logic

--
Greg Gutman (CTR), CISSP
Email: 
gregoriy.gut...@associates.fema.dhs.gov<mailto:gregoriy.gut...@associates.fema.dhs.gov>

From: Alec J Summers <asumm...@mitre.org>
Sent: Wednesday, July 13, 2022 1:09 PM
To: CAPEC Researcher Discussion <capec-research-list@mitre.org>
Subject: CWE/CAPEC Definitions

CAUTION: This email originated from outside of DHS. DO NOT click links or open 
attachments unless you recognize and/or trust the sender. Please select the 
Phish Alert Report button on the top right of your screen to report this email 
if it is unsolicited or suspicious in nature.

Dear CAPEC Research Community,

I hope this email finds you well.

Over the past few months, the CWE/CAPEC User Experience Working Group has been 
working to modernize our programs through a variety of activities. One such 
activity is harmonizing the definitions on our sites for some of our key 
terminology including weakness, vulnerability, and attack pattern. As CWE and 
CAPEC were developed separately and on a different timeline, some of the terms 
are not defined similarly, and we want to address that.

We are seeking feedback on our working definitions:

Vulnerability
A flaw in a software, firmware, hardware, or service component resulting from a 
weakness that can be exploited, causing a negative impact to the 
confidentiality, integrity, or availability of an impacted component or 
components (from CVE®)
Weakness
A type of flaw or defect inserted during a product lifecycle that, under the 
right conditions, could contribute to the introduction of vulnerabilities in a 
range of products made by different vendors
Attack Pattern
The common approach and attributes related to the exploitation of a weakness, 
usually in cyber-enabled capabilities

Note: CVE’s definition for ‘vulnerability’ was agreed upon after significant 
community deliberation, and we are not looking to change it at this time.

We are hoping to publish new, improved definitions on our websites at the end 
of the month. Please provide thoughts and comments by Tuesday, July 26.

Cheers,
Alec

--
Alec J. Summers
Center for Securing the Homeland (CSH)
Cyber Security Engineer, Principal
Group Lead, Cybersecurity Operations and Integration
––––––––––––––––––––––––––––––––––––
MITRE - Solving Problems for a Safer World™


Reply via email to