Transcript
A (0:02)
Hey, this is Casey Ellis for Risky Business, and today we are talking to Todd Beardsley from Run Zero. So Todd literally used to run CiscoKEV, the list that tells federal agencies which volumes to patch or else. And he's just dropped a research paper called Kevology that basically takes the thing apart and puts it back together again. It turns out that only a third of Kev volumes are the straight shot RCE bugs that most people would assume they are. Commodity exploits often exist for years before a volume even hits Kev. And the whole thing is a lot more nuanced than the compliance punch list that most organizations treat it as. So let's get into it. It's great to see you, Todd.
B (0:36)
It is delightful to see you again, Kasey. It's been too long.
A (0:40)
It's been way too long. So. Yeah, tell me about Cavology.
B (0:45)
Well, thanks. I'm glad you asked.
A (0:48)
Where do you want to go from here, pal?
B (0:49)
Yeah. So, Keval, I was kicking around with this for a while. Like, this is the kind of thing I wanted to do back when I worked in federal Service, because we published. When I was. Back when I worked at cisa, we published the list, right? We published the kanone Exploited vulnerabilities catalog. And you have to say kanone or else the acronym doesn't make sense.
A (1:11)
Otherwise the acronym fails. Yep.
B (1:13)
Right. So it's the known exploiteds, and we publish this catalog and we update it a few times a week. Right? And it was super fun. It was great. It was like my whole job was playing, like, exploit detective. It was so rad. And one of the best jobs I've ever had, honestly. And top. Top three. But, like, I was always a little dissatisfied with, like, the way we presented it. And I'm not a marketing guy, I promise. I. I know that I work in marketing, but that's just because all research is in marketing, actually, like it or not. And so we published the list and we didn't want. Mainly we didn't want agencies, federal agencies to, like, look at the list and say, like, cool, that's a long list. What should I do first for the federal civilian executive branch agencies, you have to do them all first. And that's just the way it goes, right? Because it's all tied back to BOD 2201, which is binding Operational Directive 2201, which say. Which states that CISA must produce a list and states that the agencies under CISA's authorities must patch the things on the list at a due date that is also on the list. Right. And so there's no notion of like prioritization or this thing is worse than that thing, or this thing is like tearing up the Internet. So I got to get to this first. There's not, none of that, none of that is in the kev. But what people don't realize is that a lot of that data is somewhere, right? And you. And it doesn't take a ton of work. It took some work to kind of, you know, just collide all those together, just like smush them all up and say like, all right, here's my list of kevs. Here's a bunch of other stuff around these vulnerabilities. Let's like make a kind of normal standard JSON format, because that's what the world needs, and publish that, right? And then see what falls out, like when you start looking at it. So like you said at the top, right, like these straight shot RCE vulnerabilities, which in cavology parlance is like, it has a CVSS score. It the cv, and that is the common vulnerability scoring system has a cvs. I don't know, man. I will expand every acronym.
