Skip to content

Vulnerability determination for insecure default configurations #29

@zmanion

Description

@zmanion

Current rule under discussion:

4.1.4 Insecure default configuration settings SHOULD be determined to be Vulnerabilities.

Concerns: The word "insecure" is subjective (varies over time and across opinions and contexts) and lacks sufficiently broad consensus, difficult for CNAs (CNA-LRs) to render a vulnerability determination decision.

Additional concern: Suppliers might make sub-optimal choices to avoid CVE ID assignments for insecure default configurations, perception that CVE ID assignments "nitpick" foundational design and implementation choices primarily made for functional reasons.

There are many examples of existing historical assignments for insecure default configurations. History does not necessarily dictate the future, but we should consider the precedents as part of this change. We may want to list some of these and other examples to help decide this change.

The CVE Program does and must continue to handle subjectivity, this is unavoidable, even if we are unable to define "insecure" tightly enough to guide assignments.

A point that came up repeatedly in SPWG discussions is the "element of surprise." If an "insecure" default behavior is well-known, clearly documented (including security considerations), and consistent over time, this would tend towards a determination of no vulnerability. In contrast, "security surprise" default configurations would tend towards a determination of vulnerability (and subsequent CVE ID assignment).

The current 4.1.4 guidance is a "SHOULD" recommendation, so strictly speaking, CNAs are free to use judgment and determine vulnerabiliity or not. A party that disagrees can dispute. So one option is to make no changes and wontfix this issue.

Another option is to remove the current 4.1.4.

A third option is a modification, here is a draft based on the "security suprise" concept and possibly removing the word "insecure" (even though we still trying to define a secure/insecure boundary).

4.1.4 Default configuration settings SHOULD be determined to be Vulnerabilities if the settings introduce surprising or unexpected security behavior.

Optional extension:

For example, consistently well-documented and widely known open default configurations SHOULD NOT be determined to be vulnerabilities.

Metadata

Metadata

Assignees

Labels

2026-Q1Rules changes under consideration for Q1 2026

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions