Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate

A prominent cybersecurity executive is calling on the U.S. government to resist the urge to match China’s reported mandates around early vulnerability disclosure, warning that such a move would “meaningfully and dramatically increase the risk” of zero-day flaws landing in the wrong hands.

A prominent cybersecurity executive is calling on the U.S. government to resist the urge to match China’s reported mandates around early vulnerability disclosure, warning that such a move would “meaningfully and dramatically increase the risk” of zero-day flaws landing in the wrong hands.

The caution, from Luta Security chief executive Katie Moussouris, follows the delivery of the first-ever CSRB (Cyber Safety Review Board) report into the Log4j security crisis, a document that calls out China’s “troubling” mandates around the disclosure of software security flaws.

“The requirement for network product providers to report vulnerabilities in their products to MIIT within two days of discovery could give the [Chinese] government early knowledge of vulnerabilities before vendor fixes are made available to the community,” according to the CSRB report (.pdf).

The CSRB said it was worried this would give China’s government “a window in which to exploit vulnerabilities before network defenders can patch them” and warned that this is a “disturbing prospect given the PRC government’s known track record of intellectual property theft, intelligence collection, surveillance of human rights activists and dissidents, and military cyber operations.”

[ READ: Chinese Gov Punishes Alibaba for Not Swiftly Reporting Log4Shell Flaw ]

The two-day mandate, the CSRB argues, could prolong the period in which the Chinese government can act on the vulnerability for its own purposes before network defenders can be made aware of a risk.

The CSRB report stopped short of making recommendations on this topic, but at least one member of the board has come forward to caution against mirroring the Chinese move.

Moussouris, a vulnerability disclosure expert who worked on the CSRB’s Log4j review, said any attempt to mandate the reporting of software flaws directly to the U.S. government will “fundamentally break the principles of least privilege” when it comes to Coordinated Vulnerability Disclosure.

In a note posted on the Luta Security blog, Moussouris said only the organizations that are responsible for creating a fix should know about a vulnerability before a patch is available. “Adding government entities to the embargo during vulnerability coordination and disclosure will not meaningfully add to our safety, but it does meaningfully and dramatically increase the risk of a leak before a patch is ready,” she added.

[ READ: Exploits Swirling for Major Security Defect in Apache Log4j ]

Moussouris, a pioneer in the use of bug bounties and creator of the first multiparty supply chain vulnerability coordination process at a major software vendor, said such a move would create a new high-value target: “a government-run treasure trove of unpatched vulnerabilities.”

The Luta Security chief executive argued that aggregating vulnerabilities from multiple software vendors in one place would raise the risk of a catastrophic security event if that database of bugs was compromised.

“As Congress considers the vulnerability landscape, contemplating requirements for reporting vulnerabilities to the U.S. government before they are patched, I hope they will listen to those of us who have considerable experience in weighing the risks of adding parties to vulnerability disclosure,” Moussouris said.

“We will not see an increase in our cyber resilience by fashioning laws to artificially bring the government into Coordinated Vulnerability Disclosure as an observing party to unpatched vulnerabilities. What we do need are more organizations around the world who are prepared with asset lists, SBOMs, and well-oiled vulnerability response capabilities that are ready, able, and willing to help collectively defend the Internet that we all share,” she added.

The initial CSRB report calls for industry adoption of tools procedures for digital asset inventory and vulnerability management, documented vulnerability response programs, improved SBOM tooling and increased investments in open source software security. 

Related: Chinese Gov Punishes Alibaba for Not Swiftly Reporting Log4Shell Flaw 

Related: Exploits Swirling for Major Security Defect in Apache Log4j

Related: Google Finds 35,863 Java Packages Using Defective Log4j

Related: Microsoft Spots Multiple Nation-State APTs Exploiting Log4j Flaw

Related: Attackers Hitting VMWare Horizon Servers With Log4j Exploits

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.