<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PSIRT - Structured Response - CLI Commands in DevNet General Discussions</title>
    <link>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309791#M2840</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Q: Does anyone have a workflow that doesn't include NLP / regex matching for CLI commands?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;A: The data (not the API), just isn't presented in a manner that supports this. Unfortunately this is a manual task, unless there is a third party who is already doing this and sharing that data.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Q: Is there any development in the pipeline for the PSIRT OpenVuln API, to include this data?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A: Cisco use to publish OVAL definitions to accompany the advisories. But that stopped a very long time ago.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Most of Cisco tools; leverage the API to populate a stored backed database; and that database is then augmented with data from other sources; such as PID mappings to Network Operating System; vulnerable configurations (manually entered and normally is based on NLP/Regex); mitigations/workarounds etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Feel free to reach out to &lt;A href="mailto:psirt@cisco.com" target="_blank"&gt;psirt@cisco.com&lt;/A&gt;&amp;nbsp;if you have ideas that you would like to have implemented. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jul 2025 23:59:34 GMT</pubDate>
    <dc:creator>PR Oxman</dc:creator>
    <dc:date>2025-07-15T23:59:34Z</dc:date>
    <item>
      <title>PSIRT - Structured Response - CLI Commands</title>
      <link>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309484#M2837</link>
      <description>&lt;P&gt;I am working on streamlining and automating vulnerability management.&lt;BR /&gt;High-level scenario:&lt;BR /&gt;- Third party software scans network appliances, matching IOS with CVEs and generating excel-based reports.&lt;BR /&gt;- These reports are manually triaged to determine which CVEs are applicable based on whether the configuration is in use.&lt;BR /&gt;- Priority is defined based on the presence of the CVE commands (and other factors).&lt;/P&gt;&lt;P&gt;I'm looking at using the PSIRT OpenVuln API to automate the process of matching CVE to device configuration.&amp;nbsp;The problem I have is that there is no structured data in the following endpoint response:&lt;BR /&gt;&lt;A href="https://developer.cisco.com/docs/psirt/cvecve_id/" target="_blank" rel="noopener"&gt;https://developer.cisco.com/docs/psirt/cvecve_id/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;Does anyone have a workflow that doesn't include NLP / regex matching for CLI commands?&lt;BR /&gt;Is there any development in the pipeline for the PSIRT OpenVuln API, to include this data?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 09:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309484#M2837</guid>
      <dc:creator>vmMikelvm</dc:creator>
      <dc:date>2025-07-15T09:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT - Structured Response - CLI Commands</title>
      <link>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309489#M2838</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/358128"&gt;@PR Oxman&lt;/a&gt;&amp;nbsp;might know this one &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 09:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309489#M2838</guid>
      <dc:creator>bigevilbeard</dc:creator>
      <dc:date>2025-07-15T09:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT - Structured Response - CLI Commands</title>
      <link>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309490#M2839</link>
      <description>&lt;P&gt;The content of the advisories unfortunately vary widely. They often don't include specific configurations to determine whether you're vulnerable to the vulnerability - some times there are workarounds listed, some times they include indications of compromise, some product families refer to the software checker to determine vulnerability while others don't.&lt;/P&gt;
&lt;P&gt;I have had most success with implementing automated checks per product family to be able to better prioritise, but it still requires manual triage for most issues.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 10:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309490#M2839</guid>
      <dc:creator>Torbjørn</dc:creator>
      <dc:date>2025-07-15T10:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: PSIRT - Structured Response - CLI Commands</title>
      <link>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309791#M2840</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Q: Does anyone have a workflow that doesn't include NLP / regex matching for CLI commands?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;A: The data (not the API), just isn't presented in a manner that supports this. Unfortunately this is a manual task, unless there is a third party who is already doing this and sharing that data.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Q: Is there any development in the pipeline for the PSIRT OpenVuln API, to include this data?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A: Cisco use to publish OVAL definitions to accompany the advisories. But that stopped a very long time ago.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Most of Cisco tools; leverage the API to populate a stored backed database; and that database is then augmented with data from other sources; such as PID mappings to Network Operating System; vulnerable configurations (manually entered and normally is based on NLP/Regex); mitigations/workarounds etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Feel free to reach out to &lt;A href="mailto:psirt@cisco.com" target="_blank"&gt;psirt@cisco.com&lt;/A&gt;&amp;nbsp;if you have ideas that you would like to have implemented. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 23:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/devnet-general-discussions/psirt-structured-response-cli-commands/m-p/5309791#M2840</guid>
      <dc:creator>PR Oxman</dc:creator>
      <dc:date>2025-07-15T23:59:34Z</dc:date>
    </item>
  </channel>
</rss>

