Page 1171 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1171

tests. Many penetration tests start with a vulnerability assessment.


               Common Vulnerabilities and Exposures


               Vulnerabilities are commonly referred to using the Common
               Vulnerability and Exposures (CVE) dictionary. The CVE dictionary
               provides a standard convention used to identify vulnerabilities.
               MITRE maintains the CVE database, and you can view it here:
               www.cve .mitre.org.




                          MITRE looks like an acronym, but it isn’t. The founders do

                  have a history as research engineers at the Massachusetts’s
                  Institute of Technology (MIT) and the name reminds people of that

                  history. However, MITRE is not a part of MIT. MITRE receives
                  funding from the U.S. government to maintain the CVE database.



               Patch management and vulnerability management tools commonly
               use the CVE dictionary as a standard when scanning for specific
               vulnerabilities. As an example, the WannaCry ransomware, mentioned
               earlier, took advantage of vulnerability in unpatched Windows
               systems, and Microsoft released Microsoft Security Bulletin MS17-010
               with updates to prevent the attack. The same vulnerability is identified

               as CVE-2017-0143.

               The CVE database makes it easier for companies that create patch
               management and vulnerability management tools. They don’t have to
               expend any resources to manage the naming and definition of
               vulnerabilities but can instead focus on methods used to check
               systems for the vulnerabilities.
   1166   1167   1168   1169   1170   1171   1172   1173   1174   1175   1176