2024å¹´8æ20æ¥ã«éå¬ããããVulsç¥ã#10 | èå¼±æ§ç®¡çã®æåç·ããªã¹ã¯è©ä¾¡ããSSVCãVEXãAIã¾ã§ããã®ã»ãã·ã§ã³ããæ®æ¥ï¼ æ¥é±ã§OK?ãéæåå¾ã®èå¼±æ§å¯¾å¿å¤æã«ä½¿ããSSVCã®ã㢠ãã®è¦ç¹ãæ¸ãèµ·ããè¨äºã§ãã YouTubeã¢ã¼ã«ã¤ãã¯ãã¡ãã§ãã ä¼å ´ã¸ã®è³ªå å æ¥IPAã®ä¸æ ¸äººæè²æããã°ã©ã åæ¥ããã¸ã§ã¯ãããããèå¼±æ§å¯¾å¿ã«ããããªã¹ã¯è©ä¾¡ææ³ã®ã¾ã¨ããã¨ããè³æãå ¬éããã¾ããããã®è³æã¯æ¬æ¥ç´¹ä»ããSSVCãEPSS, KEVãªã©ãæ¥æ¬èªã§ãããããã説æããã¦ãããã¾ãããªã¢ã¼ã¸ã«ã¤ãã¦ããã¤ãã®æ¹æ³ãè¨è¼ããã¦ããã®ã§ä¸èªããããããã¾ããããã®ä¸ã§ãã®å³ã®éã60社ã¸ã®ä¼æ¥ã«ã¢ã³ã±ã¼ããåã£ã¦ãã¾ãã æå¤ã«ããã£ãã®ããCVSSã®ç°å¢è©ä¾¡åºæºã60社ä¸15社ã使ã£ã¦ããç¹ã§ããç§ã¯2016å¹´ã«Vulsãéçºãã¦ä»¥éèå¼±æ§ç®¡çããã¼ãã«æ´»å
èæ¯ æ¬ããã¸ã§ã¯ãã¯ãICSCoE7æçã«ããã¦ãå®æ¥åã§èå¼±æ§å¯¾å¿ãè¡ãéã«ãæ¥ã å ¬è¡¨ãããå ¨ã¦ã®èå¼±æ§ã«å¯¾å¿ããããªãã¨ããåé¡ããCVSSï¼Common Vulnerability Scoring Systemï¼åºæ¬å¤ã®ã¹ã³ã¢ãèå¼±æ§ã®å¯¾å¿åªå 度ã決ããããã«å©ç¨ããã«ã¯ä¸ååã§ããã¨èããããã解決ãã¹ãç«ã¡ä¸ãããããCVSSåºæ¬å¤ãèå¼±æ§ãã®ãã®ã®æ·±å»åº¦ãè©ä¾¡ããç¹ã§ã¯æç¨ã§ãããã®ã®ãèå¼±æ§ã®æªç¨ç¶æ³ãã¦ã¼ã¶ã®ç°å¢æ å ±ãèæ ®ãã¦ããªããããèå¼±æ§å¯¾å¿ã®åªå 度ã決å®ããããã«ãåä½ã§ä½¿ç¨ããã®ã¯é©åã§ã¯ãªãã¨èãããã¾ããCVSSãEPSSï¼Exploit Prediction Scoring Systemï¼ãªã©ã®ãªã¹ã¯è©ä¾¡å¤ãèå¼±æ§å¯¾å¿ã®åªå 度ä»ãã«ä½¿ç¨ããå ´åãé©åãªé¾å¤ãè¨å®ããå¿ è¦ãããã¨å¤æãããããããè¸ã¾ãã¦ãè©ä¾¡å¤ã®å¦¥å½æ§ãå¹ççãªéç¨æ¹æ³ããªããã¨ããç¹ã«ã¤
2024å¹´7æ8æ¥ã«éå¬ããããã¸ã§ã¼ã·ã¹ãã¼ã¼ã¯ èå¼±æ§ç¥ãï½èå¼±æ§ã®å ¨ä½åã¨ä»ãåãæ¹ï½ãã®ã»ãã·ã§ã³ãSSVC DeepDiveãã®å 容ã§ãã ãããã®é©ç¨é åºã¯ãCVSSã®é«ãèå¼±æ§ãããããã§ã¯å®éã®éç¨ã¯åãã¾ãããSSVCã¯ãæ»æè ç®ç·ãåãå ¥ããèå¼±æ§è©ä¾¡ãã¬ã¼ã ã¯ã¼ã¯ã§ãç±³å½æ¿åºã§ãæ¡ç¨ããã¦ãã¾ããæ¬ã»ãã·ã§ã³ã§ã¯ãSSVCãæ´»ç¨ãããã¨ã§ãã©ã®ããã«èå¼±æ§ç®¡çãæ¹åãããã®ããå¾¹åºè§£èª¬ãã¾ããCVSSã ãã§ã¯ä¸ååãªæ¹ã«å¿ è¦ã®å 容ã§ãã Xã§ã®ã¸ã§ã¼ã·ã¹ãªèª°ãã®ã¤ã¶ããï¼æç²ï¼ã©ã³ãµã ã¦ã§ã¢ã®ãã¥ã¼ã¹ã§é¨ããã¦ããä¸ãXï¼æ§Twitterï¼ã«ã¦ãããªçºè¨ãç®ã«ãã¾ãããä»ååå ããã¦ããã¸ã§ã¼ã·ã¹ã®çããããå æ ãªæ©ã¿ãæ±ãã¦ããã¨æããç´¹ä»ãã¾ãã Xã§ã®ã¸ã§ã¼ã·ã¹ãªèª°ãã®ã¤ã¶ããã¾ã¨ããã¨ããããªå 容ã«ãªãã¨æãã¾ãã ï¼ä¼å ´ã®æ ã·ã¹ã®æ¹ãé ·ãæ¹å¤æ°ï¼ å ¬éããã
2024å¹´7æ12æ¥ã«éå¬ãããã製é æ¥ã«ãããèå¼±æ§ç®¡çã®èª²é¡ã¨å¯¾å¿æ¹æ³@大éªãã»ããã¼ã®ãSSVC Supplier Treeã®æ¦è¦ã¨èªååãã»ãã·ã§ã³ã®ã¹ã©ã¤ãã§ãã ç±³å½CISAãæ¨å¥¨ããèå¼±æ§ç®¡çã®åªå é ä½ä»ãææ³ã§ããSSVCï¼Stakeholder-Specific Vulnerability Categorizationï¼ã®æ¦è¦ã説æããPSIRTç¨ã®æ±ºå®æ¨ã§ããSupplier Treeãç´¹ä»ãã¾ããSSVCã¯èå¼±æ§ããªã¹ã¯ãã¼ã¹ã§åªå 度ä»ããããã¬ã¼ã ã¯ã¼ã¯ã§ããããã®ã¾ã¾çµç¹ã«é©ç¨ããã¨äººçå·¥æ°ã¨å°éç¥èãå¿ è¦ã§ããè¬æ¼è ã¯SSVCã®å°å ¥ã«ã¯èªååãèè¦ã§ããã¨èããèªååã®æ¹æ³ã模索ãã¦ãã¾ããæ¬ã»ãã·ã§ã³ã§ã¯ãSSVC Supplier Treeãç¨ãã¦è£½é æ¥ã®PSIRTã®èå¼±æ§ããªã¢ã¼ã¸ãèªååããæ¹æ³ãæ¢æ±ãã¾ããå ·ä½çã«ã¯ãSupplier Treeã®åDe
CVE_Prioritizerã¨SploitScanã§èãããKEV Catalog/EPSS/CVSS/SSVC æ¦è¦EPSSãKEV Catalogãæç¨ã«ä½¿ãããã¸ã§ã¯ããæè¿åºã¦ãã¾ããã ãããã«ã¤ãã¦å 容ã確èªããã©ã®ããã«ä½¿ããããåæ§ãªSSVCã¨ã©ãéãããè¦ã¦ããã¾ãã CVE_Prioritizer https://github.com/TURROKS/CVE_Prioritizer SploitScan https://github.com/xaitax/SploitScan Exective Summary EPSS, KEVã®ãã¼ã¿ç¹æ§ãèããå¿ è¦ããã EPSSã¯æ©ä¼ã®ã¿ãKEVã¯æ©ä¼ã¨èå¼±æ§ã示ã å½è©²ããã¸ã§ã¯ãã¯ä½¿ãããããCVSSã®ã¿ã§å¤æãã¦ããçµç¹ã¯ãCVE_Prioritizerãã¾ãã¯ä½¿ã£ã¦ã¿ãã®ãè¯ããããããªã å½è©²ããã¸ã§ã¯ã㯠ã·ã¹ãã åº
1. å§ãã« ããã«ã¡ã¯ãmorioka12 ã§ãã æ¬ç¨¿ã§ã¯ããã°ãã³ãã®å ¥éã¨ãã¦ã主㫠Web ã¢ããªã±ã¼ã·ã§ã³ã® OSS ã«ç¦ç¹ããããèå¼±æ§ã®çºè¦ã»å ±åã»CVE ID ã®åå¾ã«ã¤ãã¦ç´¹ä»ãã¾ãã 1. å§ãã« å 責äºé æ³å®èªè çè ã®ããã¯ã°ã©ã¦ã³ã 2. CVE ã¨ã¯ 3. æ¢ã対象ã®é¸ã³æ¹ OSS Topic (Type) ç¹å®ã®æ¡ä»¶ã§çµã ãã°ãã¦ã³ãã£ã® OSS 4. èå¼±æ§ã®æ¤è¨¼æ¹æ³ ã¢ããã¼ãæ¹æ³ 5. èå¼±æ§ã®å ±åå 6. å ±åæ¸ã®æ¸ãæ¹ CVSS CWE 7. èå¼±æ§çºè¦ãã CVE ID ã®åå¾ã¾ã§ã®æµã 注æç¹ 8. ãã°ãã³ãåã®ã¹ãã«æºå éå»ã® CVE ID ãã¬ãã¼ã Web Security ã®å ´å 9. ãã®ä» ãã®å¾ã®ãã£ã¬ã³ã¸ ãã°ãã¦ã³ãã£å ¥é ã»ãã¥ãªãã£ã¨ã³ã¸ãã¢ãç®æã就活çã®æ¹ã¸ OSS ã®éçºè ã®æ¹ã¸ 10. çµããã« å 責äºé
ããã«ã¡ã¯ãäºä¸ã§ãã FutureVulsã¯ãæ¥ã æ´æ°ãããèå¼±æ§æ å ±ãè£è¶³ããããå¹æçãªéç¨ã»ç®¡çããµãã¼ãããããµã¼ãã¹ã§ããã 2022/9/13ãªãªã¼ã¹ã«ã¦éç¨é¨åã§æç¨ãªSSVC(Stakeholder-Specific Vulnerability Categorization)ããµãã¼ããã¾ããã æ¬ç¨¿ã§ã¯ãèå¼±æ§å¯¾å¿ã®ç¾ç¶ããSSVCã®èª¬æãSSVCã®é©ç¨ä¾ã説æãã¾ãã ç®æ¬¡ èå¼±æ§å¯¾å¿ã®ç¾ç¶ åé¡ç¹ ã©ããããããã®ã SSVCã¨ã¯ æ¦è¦ ã©ã®ãããªå©ç¹ãããã®ã SSVCãé©ç¨ãã å¾æ¥ã®å¤æ SSVCã§ã®å¤æ ã¾ã¨ã èå¼±æ§å¯¾å¿ã®ç¾ç¶èå¼±æ§ãæ¤ç¥ããå¾ã«ã©ã®ããã«å¤æ/対å¿ããã®ããã¯æ©ã¿ã©ããã®å¤ãåé¡ã§ãã ä¸è¬çã«ã¯ä»¥ä¸ãèæ ®ãã¦å¯¾å¿ãæ¤è¨ãã¦ãã¾ãã èå¼±æ§èªä½ã®å±éºåº¦ èªã·ã¹ãã ã¸ã®å½±é¿åº¦ 対çé£æ度 æªå¯¾çã§ã®ãªã¹ã¯ ãã®çºãä¸è¨ãå¤æããåºæºãçµç¹ã§
é·è°·å·é½ä»(ã¯ããããããã) ï½ ã»ãã¥ãªãã£ã»ãã£ã³ãåè°ä¼ä»£è¡¨çäº ï½ ï¼æ ªï¼ã»ãã¥ã¢ã¹ã«ã¤ã»ãã¯ããã¸ã¼ åç· å½¹CTO ï½ åèå¤§å¦ é常å¤è¬å¸« ï½ OWASP Kansai ãã¼ãã¡ã³ãã¼ ï½ OWASP Japan ãã¼ãã¡ã³ãã¼ ï½ CODE BLUEã«ã³ãã¡ã¬ã³ã¹ ã¬ãã¥ã¼ãã¼ãã¡ ã³ãã¼ Webãã©ã¦ã¶ã¼ãWebã¢ããªã±ã¼ã·ã§ã³ã« é¢ããå¤æ°ã®èå¼±æ§ãçºè¦ã Black Hat Japan 2008ãéå½POC 2008ã2010ãOWASP AppSec APAC 2014ä»è¬æ¼ãè¨äºå·çãå¤æ°ã https://utf-8.jp/ Vulsç¥ã#8 #vulsjp https://utf-8.jp/
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}