center-for-threat-informed-defense / attack_to_cve

🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
https://center-for-threat-informed-defense.github.io/mappings-explorer/external/cve/
Apache License 2.0
232 stars 57 forks source link

CVEs mapped in both Phase 2 and Phase 1 #10

Open anderhos opened 7 months ago

anderhos commented 7 months ago

I have found some CVEs in Att&ckToCveMappings.csv mapped in both Phase 2 and Phase 1, but I am unsure how to interpret them:

CVE-2018-11049

CVE-2019-10980

CVE-2019-13541

Are the original labels from Phase 1 above considered incorrect and then corrected in Phase 2? In general, can the Uncategorized techniques from Phase 1 be considered to belong to any of the three Phase 2 categories (Primary Impact, Secondary Impact, or Exploit)?

tiffb commented 7 months ago

Hi anderhos, Thank you for reaching out to us about this work. While both Phase 1 and Phase 2 mappings use ATT&CK to tell the story of what the attacker is trying to achieve by exploiting a given vulnerability, Phase 2 mappings break that down into the methods adversaries use to exploit a vulnerability (Phase 1) and what adversaries may achieve by exploiting the vulnerability (Phase 2). The Phase 2 mappings were created with the intent of bringing more clarity to the entry point and follow on impacts of exploitation. In Phase, 1 you'll find a lot of mappings associated with execution methods (e.g., T1203), but there are also mappings to impacts (e.g., T1574.008). Does that help answer your questions?

anderhos commented 7 months ago

Hi @tiffb,

Thank you for your response. Your answer helped me better understand the phases. However, CVE-2019-13541 has phase 2 labeled T1575 as the primary impact, but T1575 is not mentioned in the methodology document. Is this an incorrect label?

T1575 is also used a couple more times for other CVEs in the dataset.