We are currently engaged in the CWE Compatibility and Effectiveness Program, and working towards fulfilling its requirements to use CWE in our own outside-in methodology for identifying and eliminating the most dangerous software errors and weaknesses in our products. The CWE Compatibility and Effectiveness Program is a formal review and evaluation process for declaring products and services as “CWE-Compatible” and “CWE-Effective.”
To understand how CWE identifiers are assigned to Red Hat vulnerabilities, you also need to understand some elements of CWE terminology. CWE identifiers—also known as CWE IDs or CWEs—are organized into four main types: Category, Compound Element, View, and Weakness.
- Category IDs are assigned to sets of weaknesses sharing one or more common attributes.
- Compound Element IDs are assigned to combinations of weaknesses (i.e., Composites and Named Chains—more on these later).
- View IDs are assigned to predefined perspectives from which you might look at weaknesses.
- Weakness IDs are assigned to the actual software weaknesses themselves.
Weaknesses are also organized into three main types: Class, Base, and Variant.
- Class is the most abstract type of weakness.
- Base is a more specific type of weakness that is still mostly independent of a specific resource or technology.
- Variant is a weakness specific to a particular resource, technology, or context.
Due to the diverse nature of our products, the preferred type of weakness for CWE assignments are weakness bases. Weakness classes are used in cases that there are “research gaps”, and it turns out to be difficult to make consistent CWE assignments using related weakness bases.
Weaknesses IDs are assigned to Red Hat vulnerabilities in chains. A chain is a sequence of two or more weaknesses closely linked together. Where one weakness X, can directly create the conditions necessary to cause another weakness Y, resulting in a vulnerability. In such cases, CWE refers to X as “primary” to Y, and Y as “resultant” from X.
A named chain is a noted commonly recurring chain that have received its own CWE identifier. A composite is an inclusive combination of two or more weaknesses or chains that forms another named weakness or vulnerability.
Differently from what security assessment tools do—with a few exceptions, such as integer overflows and variants—vulnerabilities are commonly named and reported as its resultant weaknesses, with little or no additional research from the reporting party. Therefore, it is up to Red Hat to construct the chain backwards to properly identify the cause of the vulnerability.
In the last post, I will present and go through the reasons behind the decisions for the elements in the CWE coverage for Red Hat Customer Portal.