This posted was authored by Mitch Neff and Yves Younan
Responsible disclosure of vulnerabilities lies at the heart of security research. The difficulty in responsible disclosure is balancing competing interests – assisting a vendor with patching their product and notifying the general public to prevent a 0-day situation. Discussing these deadlines raises an inconvenient and sometimes uncomfortable fact – the offensive security teams are much more steeped in vulnerability research than their defensive counterparts who must patch products and protect networks and users. The uncomfortable part is to acknowledge that if a white hat team has discovered a vulnerability in a high value target, it stands to reason their adversaries with a darker hat may also be trying to exploit the same vulnerability. We must carefully balance the needs and capabilities of vendors to fix a product with the safety and security of our customers and the community as a whole.
Talos has been measuring the timelines, industry responsiveness, and end results with regard to our responsible disclosure policy and today, we are announcing a few changes. The full text of the Vendor Vulnerability Reporting and Disclosure Policy can be found here: http://www.cisco.com/c/en/us/about/security-center/vendor-vulnerability-policy.html
. These changes include timeline adjustments based on vendor feedback and industry changes since we last addressed our Disclosure Policy.
The most obvious change shown in the table below is the extension from a baseline of 60-days to 90-days. This change was made based on many factors, including: vendor feedback, average time to patch (from our data), and protecting the best interests of our customers and the internet in general. Below we have outlined several key steps in the updated Disclosure Policy. In the interest of coordinated vulnerability disclosure, Cisco will attempt to work with any vendor on reasonable adjustments to the timeline if progress is being made and the default timeline is not adequate for creating a patch. Extenuating circumstances, such as threats of any nature, may result in adjustments to disclosures and timelines either forward or backward.
If a vendor has remained unresponsive forty-five days after the initial contact, the vulnerability report will also be supplied to the Carnegie Mellon Computer Emergency Response Team (CERT). In compliance with the CERT vulnerability disclosure guidelines
, the vendor will then have approximately forty-five days before public disclosure of the vulnerability information.
Let’s take a look at what we found in terms of vendor timelines and time-to-patch (TTP). Across the vendor space, the overall average was 78 days to patch. At first glance, Commercial vendors seem much slower than their Open Source counterparts. However, breaking that down further reveals some interesting information:
*Data pulled from sample of 143 Talos bug reports.
There is a bit more nuance here than the top line data indicates. To illustrate that, Commercial vendors are subdivided into Leading (within the policy timeframe) and Lagging (taking longer than the established timeframe). Interestingly, several large commercial vendors of consumer software were found in the Leading category. The most responsive of these vendors were noted as “Quick Turn-around Commerical” vendors in our data – and they share some common traits. All are large commercial vendors of popular consumer software, have taken a public stance on product security, and have active bug-bounty programs. This indicates these companies have invested heavily in product security and take that security seriously. They are competitive with Open Source companies in terms of time to patch. It is encouraging that the number of companies in this category increasing, although the Lagging end of the Commercial space still managed to drag the overall average down from ~40 to 78 days. It should be noted anecdotally that an Open Source vendor provided a same-day fix during this time period.
There is a trend toward the positive in our data. Obviously, vendors are realizing the serious economic impact that a true 0-day can have on their customers. Additionally, the loss of goodwill in the marketplace can cause irreparable damage to both the vendor and their customers. As vendors trend toward prioritizing updates, patches, and fixes, we have taken note. The changes in our Disclosure Policy reflect the timelines that are tenable to vendors, and bring our process into alignment with similar programs in the industry.
Our goal with the updates to this policy are clear and simple – working better together with vendors and the security community to mitigate as many threats as possible. Of all people, we understand that every vuln is unique.
Source: Security Bloggers Network @ November 28, 2016 at 09:12AM