Driving further categorization within Automotive
With the vulnerability categorization being central to many security teams’ reporting, it’s essential to get the insight and visibility needed to make decisions. That’s why we partnered with Stellantis to add twenty automotive specific vulnerabilities across CAN, ABS, RSU, and infotainment systems. This builds upon the efforts in 2019 to support v1.7 in creating the initial
Automotive Security Misconfiguration category, and we look forward to the community’s ideas on how to further improve.
Reducing impact of Flash with end of life
As Adobe announced Adobe Flash’s end of life on December 31, 2020, all major browsers have coordinated to disable Flash from running. Due to strong mitigation plans upstream at the browser to disable end-users interaction with Flash, we’ve downgraded all Flash-based entries to P5.
Train to reduce repeat vulnerabilities
Fixing a vulnerability is good, but training a team to reduce the chance of it happening again is better. That’s why we’ve partnered with Secure Code Warrior to link each of our categories to their applicable training. Leveraging mappings to VRT is a breeze thanks to our Ruby client that does all the hard-lifting of mapping and deprecating classification so you can easily find the CWE, CVSS, Remediation Advice and soon, the Secure Code Warrior mapping for any classification.
Celebrating our tenth version
Over the past four years we’ve seen over a hundred issues opened up to the community, ultimately driving updates to improve categorization, impact, and remediation understanding across all users who leverage the Vulnerability Rating Taxonomy. Thank you to all who have provided feedback!
Check out the latest version and stay attuned to what’s next by subscribing to future discussions.