I did not copy everyone on my response… Jim Whitmore
> On Jul 15, 2022, at 10:20 AM, Jim Whitmore <jj-whitm...@comcast.net> wrote: > > > Alec, thanks for the note. These terms overlap and are sometimes the source > of confusion. I have been working with these resources for several years. My > observation is that the CWE definition is is not exactly what the data is, > and CAPEC definition could be less obtuse. > > In my mind... > > CAPEC is a catalog of attack patterns where an attack pattern is a behavior > and exploit associated with actions by bad actors and/or malware. > > CWE is a catalog of descriptions of weaknesses, where a weakness is a > technology flaw, misconfiguration or oversight in design, integration and > operation that enable attacks by bad actors and malware or lead to unexpected > operating conditions. > > The problem I see is that current CWE catalog only covers a subset of types > of weaknesses associated with technology (hardware and software). What I mean > is that CAPEC identifies attacks behaviors and exploits that have no > corresponding CWE. This is true for about 25% of the CAPEC entries. > Analyzing the 25% of CAPEC entries, reveals that these CAPEC entries are > "enabled" by (a) abuses of normal function, (b) weaknesses in human behavior, > (c) etc. > > Also, I suggest that CVE should be referenced as a catalog of instances of > CWEs. > > I am happy to discuss further. > > Jim Whitmore > > >> On 07/13/2022 1:08 PM Alec J Summers <asumm...@mitre.org> wrote: >> >> >> Dear CAPEC Research Community, >> >> >> >> I hope this email finds you well. >> >> >> >> Over the past few months, the CWE/CAPEC User Experience Working Group has >> been working to modernize our programs through a variety of activities. One >> such activity is harmonizing the definitions on our sites for some of our >> key terminology including weakness, vulnerability, and attack pattern. As >> CWE and CAPEC were developed separately and on a different timeline, some of >> the terms are not defined similarly, and we want to address that. >> >> >> >> We are seeking feedback on our working definitions: >> >> >> >> Vulnerability >> >> A flaw in a software, firmware, hardware, or service component resulting >> from a weakness that can be exploited, causing a negative impact to the >> confidentiality, integrity, or availability of an impacted component or >> components (from CVE®) >> >> Weakness >> >> A type of flaw or defect inserted during a product lifecycle that, under the >> right conditions, could contribute to the introduction of vulnerabilities in >> a range of products made by different vendors >> >> Attack Pattern >> >> The common approach and attributes related to the exploitation of a >> weakness, usually in cyber-enabled capabilities >> >> >> >> Note: CVE’s definition for ‘vulnerability’ was agreed upon after significant >> community deliberation, and we are not looking to change it at this time. >> >> >> >> We are hoping to publish new, improved definitions on our websites at the >> end of the month. Please provide thoughts and comments by Tuesday, July 26. >> >> >> >> Cheers, >> >> Alec >> >> >> >> -- >> >> Alec J. Summers >> >> Center for Securing the Homeland (CSH) >> >> Cyber Security Engineer, Principal >> >> Group Lead, Cybersecurity Operations and Integration >> >> –––––––––––––––––––––––––––––––––––– >> >> MITRE - Solving Problems for a Safer World™ >> >> >> >>