CVEs and the NVD Process (2024)

An Introduction

The Common Vulnerabilities and Exposures (CVE) program is a dictionary or glossary of vulnerabilities that have been identified for specific code bases, such as software applications or open libraries. This list allows interested parties to acquire the details of vulnerabilities by referring to a unique identifier known as the CVE ID. It has garnered increasing awareness in recent years, making it important for participants and users to understand the fundamental elements of the program.

Founded in 1999, the CVE program is maintained by the MITRE corporation and sponsored by the U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). CVE IDs are primarily assigned by MITRE, as well as by authorized organizations known as CVE Numbering Authorities (CNAs)—an international group of vendors and researchers from numerous countries. The project has an advisory board comprised of significant players in cybersecurity research, academia, and software development communities.

The CVE program was created with the vision of becoming the industry standard in establishing a baseline for vulnerabilities, and all information contained in the project is publicly available to any interested party. This allows stakeholders a common means of discussing and researching specific, unique exploits. CVE IDs are also used by vendors and cybersecurity personnel for research and the identification of new vulnerabilities. (MITRE and CNAs do not assist in mitigating or patching vulnerabilities on the CVE list.)

The CVE Assignment and Vetting Process

CVE IDs are assigned by the CVE Assignment Team and CNAs. The diversity of CNAs provides varied yet specific areas of expertise for different types of vulnerabilities. Each CNA is able to reserve a CVE ID when the need arises. Regular training and retraining of CNA staff and the establishment of a hierarchy of CNAs to govern various authorities help ensure that the guidelines for the process are followed and that standards are being met.

CNAs use a policy known as the Counting Process in addition to an inclusion decision tree to determine if an individual vulnerability should be included in the CVE list and if more than one CVE ID needs to be assigned. This process begins when a reporter (typically the original individual or organization(s) that discovered the bug) contacts the CVE Assignment Team or an appropriate CNA to request a CVE ID.

Each CVE must include a description that is either provided by the reporter or created using the CVE Assignment Team’s optional template. This description includes the type of vulnerability (e.g., a buffer overflow, NULL pointer dereference, or cross-site request forgery), the product’s vendor, and the affected code base(s). Reporters can provide further information, such as the expected impact, attack vectors, or state of remediation. Once the vetting process is completed, a CVE ID is assigned.

RESERVED tags are used when CVE IDs have been assigned or potentially assigned to vulnerabilities which need further details before they can be finalized. Should the vulnerability be unsuitable for publication, it will be denied a CVE ID and tagged REJECTED by the CNA. This may occur due to a lack of qualifying factors, irregularities in the reporting process, or a request to be withdrawn by the original reporter.

A CVE ID also may be given a DISPUTED tag should the vendor or other authoritative entity challenge the validity of the vulnerability. This can occur before or after National Vulnerability Database enrichment efforts (see below).

NVD CVE Enrichment

The National Vulnerability Database (NVD) is tasked with enriching each CVE once it has been published to the CVE List, after which it is typically available in the NVD within an hour. Once a CVE is in the NVD, enrichment team members can begin the enrichment process. The processing time can vary depending on the CVE, the information available, and the quantity of CVEs published within a given timeframe. NVD enrichment efforts use the reference information provided with the CVE and any publicly available information at the time of enrichment to associate Reference Tags, Common Vulnerability Scoring System (CVSS) v4.0, CVSS v3.1, CWE, and CPE applicability statements. As of July 13th, 2022, the NVD no longer generates CVSS v2.0 enrichment data for CVE records.

The following is a general overview of the enrichment process for a given CVE:

  1. Enrichment efforts begin with reviewing any reference material provided with the CVE record and assigns appropriate reference tags. This helps organize the various data sources to help researchers find the relevant information for their needs. Enrichment efforts also include manual searches of the internet to ensure that any other available and relevant information is used for the enrichment process. NVD enrichment efforts only use publicly available materials in the enrichment process.
  2. A common weakness enumeration (CWE) identifier is assigned that categorizes the vulnerability. NVD enrichment efforts use a subset of the full list of CWEs that best represents the distribution of specific types of vulnerabilities. This subset is known as the CWE-1003 view and was created through coordination with the MITRE CWE team.
  3. CVSS V3.1 exploitability and impact metrics are assigned based on publicly available information and the guidelines of the specification.
  4. A Common Product Enumerator (CPE) Applicability Statement is associated with the vulnerability. The CPE match criteria identifies all potentially vulnerable software and/or hardware for the vulnerability. For example, an application may have several versions affected or must be running on a specific operating system to be vulnerable. Automated processes can reference match criteria within the applicability statements against the CPE dictionary to assist in identifying vulnerable products within an organization’s information system.
  5. Enrichment effort results are given a quality assurance check by another more senior team member prior to being published to the website and data feeds.

CVE Maintenance

Once a CVE is published and NVD enrichment is provided, there may be additional maintenance or modifications made. References may be added, descriptions may be updated, or a request may be made to have a set of CVE IDs reorganized (such as one CVE ID being split into several). Furthermore, the validity of an individual CVE ID can be disputed by the vendor. The NVD does make efforts to re-assess CVEs that have been changed after previous enrichment. The NVD always appreciates and encourages feedback from the community to keep the dataset and CPE Dictionary accurate and current.

Created September 20, 2022 , Updated June 27, 2024

CVEs and the NVD Process (2024)

FAQs

What is CVE and NVD? ›

CVE – Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed vulnerabilities and exposures that is maintained by MITRE. NVD – The National Vulnerability Database (NVD) is a database, maintained by NIST, that is fully synchronized with the MITRE CVE list.

What is the CVE process? ›

The mission of the CVE ® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog.

What is CVEs in networking? ›

CVE stands for Common Vulnerabilities and Exposures. The system provides a method for publicly sharing information on cybersecurity vulnerabilities and exposures.

What is CVE vs CWE vs NVD? ›

NVD integrates CWE into the scoring of Common Vulnerabilities and Exposures (CVE®) entries, upon which NVD is built, by providing a cross section of the overall CWE structure. NVD analysts score CVEs using CWEs from different levels of the hierarchical structure.

What does NVD do? ›

The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What is a CVE example? ›

One example would be a loosely secured cloud storage system that allows attackers to access sensitive data. Another example would be an open network port on a server which is further exploited through the installation of command and control malware.

Is CVE a vulnerability? ›

CVE is a dictionary of common names for publicly known cybersecurity vulnerabilities. CVE's common identifiers— called CVE Identifiers—make it easier to share data across separate network security databases and tools, and provide a baseline for evaluating the coverage of an organization's security tools.

Who maintains CVEs? ›

Founded in 1999, the CVE program is maintained by the MITRE corporation and sponsored by the U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA).

How often is NVD updated? ›

The "year" feeds are updated once per day, while the "recent" and "modified" feeds are updated every two hours. The NVD plans to retire all legacy data feeds while guiding any remaining data feed users to updated application-programming interfaces (APIs).

What are CVEs used for? ›

CVE stands for Common Vulnerabilities and Exposures. CVE is a glossary that classifies vulnerabilities. The glossary analyzes vulnerabilities and then uses the Common Vulnerability Scoring System (CVSS) to evaluate the threat level of a vulnerability.

How are CVEs determined? ›

CVEs are given a rating using the Common Vulnerability Scoring System (CVSS). The base score is composed of six metrics which can be used to calculate a severity score of 0-10. These metrics are: Access vector – The way in which a vulnerability can be exploited (e.g., locally or remotely)

Why is CVE important? ›

The CVE provides descriptions, dates, and other information about vulnerabilities. Additionally, the CVE sometimes lists the fixes or solutions for a specific vulnerability. This valuable information allows an IT team to learn more about a vulnerability so that they can come up with a solution.

What is the most common CVE? ›

The most exploited vulnerabilities in 2022
  • CVE-2020-1938 (GhostCat)
  • CVE-2018-2894. ...
  • CVE-2019-8442. ...
  • CVE-2021-26086. ...
  • CVE-2020-14179. ...
  • CVE-2018-13379. ...
  • CVE-2021-44228 (Log4j or Log4Shell) ...
  • CVE-2021-34473 (ProxyShell) ...

When would you use CVE? ›

CVEs are important because they provide a way to classify and keep track of all known vulnerabilities. This allows organizations and system administrators to quickly assess the risk level associated with a particular vulnerability, making it easier to prioritize security fixes and patches.

What does CVE stand for NIST? ›

Sources: NIST SP 800-128 under Common Vulnerabilities and Exposures (CVE) NIST SP 800-128. A dictionary of common names for publicly known information system vulnerabilities.

What does the CVE refer to? ›

Common Vulnerabilities and Exposures (CVE) is a list that records publicly disclosed software vulnerabilities, as the name suggests. It is a dictionary that aims to facilitate data distribution across separate vulnerability databases and security tools.

What is going on with NVD? ›

The National Vulnerability Database is so overwhelmed with a steadily increasing number of software and hardware flaws that the National Institute of Standards and Technology, which maintains the common vulnerabilities and exposures repository, called for a slight pause to regroup and reprioritize its efforts.

What is CVE in neuro? ›

Cerebrovascular Duplex Evaluation (CVE)

A CVE provides a noninvasive way to document and monitor disease or abnormalities. It is used to assess many medical conditions, including TIA/stroke, cerebrovascular disease, syncope, dizziness, atypical headaches/migraines, visual defects, and single-sided weakness/numbness.

What does CVE mean ship? ›

The escort carrier or escort aircraft carrier (U.S. hull classification symbol CVE), also called a "jeep carrier" or "baby flattop" in the United States Navy (USN) or "Woolworth Carrier" by the Royal Navy, was a small and slower type of aircraft carrier used by the Royal Navy, the Royal Canadian Navy, the United States ...

Top Articles
Principles: Personal Autonomy | Disability Rights California
Is Airbnb Dead in 2024? Short Term Rental Market Analysis
Rosy Boa Snake — Turtle Bay
Riverrun Rv Park Middletown Photos
#ridwork guides | fountainpenguin
Pinellas County Jail Mugshots 2023
Visitor Information | Medical Center
Fort Carson Cif Phone Number
Mileage To Walmart
Nikki Catsouras Head Cut In Half
Best Cheap Action Camera
Nwi Police Blotter
Tripadvisor Near Me
Raid Guides - Hardstuck
Bros Movie Wiki
Theycallmemissblue
Nioh 2: Divine Gear [Hands-on Experience]
Busted Newspaper S Randolph County Dirt The Press As Pawns
2024 U-Haul ® Truck Rental Review
Jvid Rina Sauce
Ts Lillydoll
Rhinotimes
Destiny 2 Salvage Activity (How to Complete, Rewards & Mission)
The Ultimate Style Guide To Casual Dress Code For Women
Georgia Vehicle Registration Fees Calculator
Missouri Highway Patrol Crash
Where Is George The Pet Collector
Indystar Obits
Eine Band wie ein Baum
Tips on How to Make Dutch Friends & Cultural Norms
Maxpreps Field Hockey
Ivegore Machete Mutolation
Weve Got You Surrounded Meme
Belledelphine Telegram
Riverstock Apartments Photos
Gopher Hockey Forum
Gncc Live Timing And Scoring
Everything You Need to Know About Ñ in Spanish | FluentU Spanish Blog
Citibank Branch Locations In Orlando Florida
Ultra Clear Epoxy Instructions
No Hard Feelings Showtimes Near Tilton Square Theatre
Metro By T Mobile Sign In
Plead Irksomely Crossword
Thelemagick Library - The New Comment to Liber AL vel Legis
Avance Primary Care Morrisville
Senior Houses For Sale Near Me
Adams-Buggs Funeral Services Obituaries
UNC Charlotte Admission Requirements
Tito Jackson, member of beloved pop group the Jackson 5, dies at 70
Meee Ruh
Evil Dead Rise - Everything You Need To Know
Honeybee: Classification, Morphology, Types, and Lifecycle
Latest Posts
Article information

Author: Wyatt Volkman LLD

Last Updated:

Views: 6361

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.