Agentless security for your infrastructure and applications - to build faster, more securely and in a fraction of the operational cost of other solutions
hello@secopsolution.com
+569-231-213
Vulnerability Exploitability eXchange (VEX) is a machine-readable artifact that contains product and vulnerability details. It is also a form of security advisory that aims to inform users about the potential for exploiting components with known security flaws within the context of the product in which they are utilized. Software vendors and other parties can convey the exploitability status of vulnerabilities using VEX, making it clear which exposures are risky and which are not.
The VEX report is mainly focused on identifying whether a vulnerability is exploitable or not in the product. And this information can be identified by looking at the sub-field “status” of the vulnerabilities field of the report.
The “status” displays the following options in the report:
The defined format for VEX documents is the Common Security Advisory Framework (CSAF) which was released by OASIS. So in this blog, we are going to analyze the VEX report according to the CSAF format.
Let us understand the VEX document with the help of an example of VEX document by the OASIS CSAF Technical committee on GitHub: https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/examples/csaf/csaf_vex/2022-evd-uc-01-a-001.json
VEX report is a binding of 3 important elements which are:
The document section includes standard document data. This data consists of the CSAF version, publisher information, and revision history. You can see the example of the following information present in the document section of the JSON format of VEX document:
The product Tree section consists of the product detail that has been assessed for vulnerability exploitable. It basically Lists all products referenced in the CSAF document.
From the above example, you can see that the product_id is mentioned which is used to map the vulnerability in the VEX document.
The vulnerabilities section displays the list of vulnerabilities affecting one or many products it consists of its CVE_ID, a short description of the vulnerability, any possible remediation, and most important part the status of the vulnerability which is used to identify whether it is actually important to focus on this vulnerability or not. This status can be any of the following:
From the above example, you can see that CVE-2021-44228 is showing the status affected for the product_id CSAFPID-0001 which means instant remediation is required in that product against this vulnerability.
Additionally, there is no subcomponent metadata to indicate which CVEs might be found in the product's subcomponents. Although it doesn't directly address the problem, CSAF 2.0 does offer a URL link to get an SBOM from the product tree. However, This comes with the standard set of problems in URLs, such as broken links and a lack of non-repudiation.
VEX provides us with a promising standard format to declare whether a product is vulnerable to a given vulnerability. In the future VEX can become a common tool that helps security analysts and service operators assess risk and prioritize vulnerabilities.
SecOps Solution is an award-winning agent-less Full-stack Vulnerability and Patch Management Platform that helps organizations identify, prioritize and remediate security vulnerabilities and misconfigurations in seconds.
To schedule a demo, just pick a slot that is most convenient for you.