Audit Reveals Insecurity in Commerce Department’s Public Systems

Published:

spot_img

Department of Commerce’s Vulnerability Disclosure Program Faces Criticism

Overview of the Vulnerability Disclosure Program

The Vulnerability Disclosure Program (VDP) initiated by the U.S. Department of Commerce is aimed at safeguarding its public-facing information technology systems. However, a recent audit by the Office of Inspector General (OIG) has revealed that the program is not operating at full effectiveness.

This VDP was established following directives from the Cybersecurity and Infrastructure Security Agency (CISA), which mandated all federal agencies to have a mechanism in place for reporting and addressing security vulnerabilities in government systems that are accessible via the internet. Such programs play a vital role in enhancing federal cybersecurity by enabling agencies to utilize external resources to protect their digital infrastructures effectively.

Key Shortcomings Identified in the Audit

The OIG report, officially titled Audit of the Department’s Vulnerability Reporting and Resolution Program (Report Number OIG-26-002-A), identified various deficiencies within the VDP. The audit pointed out that the program is indeed established but lacks several essential elements for it to be deemed effective.

Notably, the audit found that not all internet-accessible systems were incorporated into the VDP. Furthermore, the testing protocols limited the types of tools available for public security researchers, which could hinder the identification of vulnerabilities. The report also indicated a concerning trend: vulnerabilities reported were not consistently addressed, and deadlines for remediation were often missed.

Exposing Gaps in Remediation

Among the 71 resolved vulnerability disclosures evaluated by the OIG, only 57—roughly 80%—were completely addressed. This left 14 unresolved, highlighting a significant gap. The report noted that the department missed remediation deadlines approximately 35% of the time since the beginning of 2023. The OIG’s findings underscore a pressing issue: without an effective VDP, the Department of Commerce cannot adequately shield its internet-accessible systems from potential threats, increasing the risk of exploitation.

Additionally, the audit flagged structural limitations within the VDP itself. The program extended its focus to only 64 internet-accessible websites, neglecting 22 department-owned sites. Compounding this issue, the contractor responsible for managing the VDP portal restricted the use of automated scanners, which are crucial for public security researchers in detecting vulnerabilities efficiently.

Recommendations for Improvement

In light of these findings, the OIG offered three actionable recommendations to bolster the VDP. Firstly, the Department of Commerce needs to revise its testing scope to comply with CISA’s Binding Operational Directive 20-01. This directive stresses the importance of including all internet-accessible systems in vulnerability disclosure initiatives.

Secondly, it’s imperative that the department updates standard operating procedures for both vulnerability reporting and resolution to ensure a comprehensive approach to addressing identified issues. Lastly, the OIG suggested the creation of an automated system to facilitate improved communication between contractors and departmental bureaus, ensuring timely actions are taken to address any remediation delays.

The Critical Role of Vulnerability Disclosure Programs

The OIG audit highlights the essential function of Vulnerability Disclosure Programs (VDPs) in the realm of federal cybersecurity. According to CISA, a robust VDP enables agencies to proactively identify weaknesses before they can be exploited. It ensures that vulnerabilities reported by security researchers undergo systematic assessment, tracking, and remediation.

Organizations aiming to fortify their cybersecurity can leverage platforms like Cyble, which offers AI-powered threat intelligence solutions. Cyble provides real-time insights into exposed assets, vulnerabilities, and emerging threats, making it easier for organizations to manage risk proactively.

With its advanced tools, such as Blaze AI, Cyble automates processes related to threat detection, vulnerability management, and incident response, helping organizations stay ahead of potential attackers.

For those interested in exploring their vulnerabilities, Cyble offers personalized demos to understand potential risks and enhance their security posture.


  • Cybersecurity Best Practices for Federal Agencies
  • The Importance of Vulnerability Management
  • Tools for Effective Cyber Threat Intelligence
spot_img

Related articles

Recent articles

Dubai’s GDP Grows 4.4% to $65.6bn as Sheikh Hamdan Advocates for Enhanced Private Sector Collaboration

Dubai's Economic Growth: A Dynamic Shift in Strategy The Dubai economy experienced robust growth in the first half of the year, expanding by 4.4% to...

Poland Detains Russian Suspected of Hacking European E-Commerce Databases

Polish Authorities Arrest Russian National in Cybercrime Investigation On November 16, Polish authorities apprehended a 23-year-old Russian citizen linked to unauthorized access of e-commerce platforms....

EU Finalizes Child Sexual Abuse Detection Law After Three Years of Debate

Understanding the Child Sexual Abuse Regulation in the EU The European Union (EU) has recently made significant strides in addressing the critical issue of child...

Bloody Wolf Intensifies Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Cybersecurity Threat: Bloody Wolf's Campaign in Central Asia Introducing the Cyber Threat The hacking group known as Bloody Wolf has emerged as a significant cyber threat,...