NVD - CVE FAQs (2024)

  1. What is the CVE Lifecycle?
  2. What are CVE Statuses in NVD?
  3. What does it mean when a CVE status says "Modified"?
  4. If a CVE has been remediated can it be removed from the NVD?
  5. How do I request a change to a CVE description or reference links?
  6. What are reference tags?
  7. How does the CVSS calculation work and where is it from?
  8. How should I use CVSS scores provided by NVD?
  9. How do I dispute a CVSS vector string provided by NVD?
  10. Why don’t scores provided by NVD match scores provided by vendors or other parties?
  11. Have all older CVEs been updated to CVSSv3?
  12. Why does the NVD not contain a CVE-ID that is publicly disclosed?

Q.

What is the CVE Lifecycle?

A.

Vulnerabilities are identified by CVE Numbering Authorities (CNA), individuals, or organizations and reported to the CVE Program. When a vulnerability is identified, the CVE Assignment Team or CNA may assign the vulnerability a CVE Identifier (CVE-ID). A determination is then made by the CNA or CVE Assignment Team to publish the information for the CVE, changing the CVE in the Official CVE List from being marked **RESERVED** to having a published CVE Description and Reference links.

The National Vulnerability Database (NVD) is tasked with enriching each CVE once it has been published to the CVE List. NVD enrichment efforts use the reference information provided with the CVE and any publicly available information at the time of enrichment to associate Reference Tags, Common Vulnerability Scoring System (CVSS) v4.0, CVSS v3.1 base metrics, CWE, and CPE Applicability statements.

Q.

What are CVE Statuses in NVD?

A.

The NVD includes statuses for both the NVD and CVE Program workflows. For details on the statuses that each organization uses please reference nvd.nist.gov/vuln/vulnerability-status.

A.

Once a CVE is in the NVD, enrichment efforts can begin. After enrichment is complete, CVE data may be updated (modified). If modification occurs, the NVD will automatically refresh any associated CVE records. The NVD publishes a changelog for every CVE that may be accessed on the CVE record’s detail page or the Change History API.

If the CVE changes to the REJECTED status in the CVE List, the NVD record will also change to REJECTED and any previously associated data will be removed except for the CVE Description. The CVE Description is then be updated to reflect what information is present in the CVE List as rejected CVE descriptions explain the rejection.

Q.

If a CVE has been remediated can it be removed from the NVD?

A.

No. If a vulnerability has been remediated, it still exists in unpatched code. Similarly, vulnerabilities that are marked as rejected in the CVE Assignment Team or CNAs also remain in the database.

Q.

How do I request a change to a CVE description or reference links?

A.

The NVD does not have direct control over CVE descriptions or reference links provided by the CVE List. You will need to contact the CVE Assignment Team using the form at cveform.mitre.org. Changes from the CVE List to a CVE already published in the NVD will be populated on the website and API within 24 hours.

Q.

What are reference tags?

A.

NVD enrichment efforts associate reference tags (e.g., Vendor Advisory, Patch, Third Party Advisory) to CVE reference links provided in the CVE List. Reference tags categorize the links and help make sense of the information.

Q.

How does the CVSS calculation work and where is it from?

A.

CVSS is an industry standard used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS v2.0, 3.0 and 3.1 consist of three metric groups: Base, Temporal, and Environmental. CVSS v4.0 consists of four metric groups: Base, Threat, Environmental and Supplemental.Each is maintained by the FIRST CVSS Special Interest Group (SIG). NVD's CVSS calculator is implemented according to the specification found at first.org/cvss/specification-document.

The NVD also offers the public CVSS calculators for CVSS v2.0, v3.0, v3.1 and v4.0. The CVSS v3 calculator page contains buttons which allow users to toggle between CVSS v3.0 and 3.1 equations.

nvd.nist.gov/vuln-metrics/cvss/v2-calculator

nvd.nist.gov/vuln-metrics/cvss/v3-calculator

nvd.nist.gov/vuln-metrics/cvss/v4-calculator

Q.

How should I use CVSS scores provided by NVD?

A.

NVD enrichment efforts provide CVSS Vector strings for base metrics that produce a score ranging from 0 to 10, which can then be modified by assessing the Temporal and Environmental metrics. Organizations can use this information, along with their own individualized Temporal and Environmental vectors and metrics, to determine an overall score. The overall score can then be used in ranking the severity of vulnerabilities associated with the organization’s information systems and help to determine mitigation strategies.

Q.

How do I dispute a CVSS vector string provided by NVD?

A.

Any issues regarding the data associated by NVD enrichment efforts can be disputed by contacting NVD staff using ourcontact form.

Q.

Why don’t scores provided by NVD match scores provided by vendors or other parties?

A.

The NVD assesses CVEs using publicly available information at the time of enrichment. To ensure that the vector strings in the NVD reflect publicly available information and abide by CVSS specification guidelines, CVSS vector strings provided by third parties are not copied outright. This can lead to differences in CVSS vector strings between different parties. Usually NVD and vendor/third party vector strings differ due to information being overly vague or unavailable at the time of enrichment. If you believe that a CVSS vector string should be revised, please contact the NVD using ourcontact form and provide publicly available information that corroborates any claims.

Q.

Have all older CVEs been updated to CVSSv3?

A.

The NVD is prioritizes the enrichment of new vulnerabilities or vulnerabilities that have changed since their last enrichment. At this time, there are no plans to retroactively assess vulnerabilities published before Dec 20, 2015 with CVSS v3.0 scores.

A similar approach is planned for after the release of CVSSv4.

Q.

Why does the NVD not contain a CVE-ID that is publicly disclosed?

A.

Third-party organizations may release advisories regarding a CVE-ID prior to that CVE being published in the CVE List. The CVE Program refers to these as “Reserved but Public” (RBP). The NVD does not participate in the vulnerability disclosure or the CVE publication process. CVEs are typically available in the NVD within an hour of being published to the CVE List. If you have further questions, please contact the CVE Assignment Team directly atcveform.mitre.org.


Created September 20, 2022 , Updated June 27, 2024

NVD - CVE FAQs (2024)

FAQs

How would you answer the argument that threat actors could use CVE? ›

I would say that threat actors can use CVE as a way of information about vulnerabilities. But I'd say it is also important to note that CVE's main purpose would be to strengthen cybersecurity. Scroll down to CVE List Basics . What is the process by which a vulnerability becomes a CVE listing?

What is the difference between CVE and NVD? ›

CVE – Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed vulnerabilities and exposures that is maintained by MITRE. NVD – The National Vulnerability Database (NVD) is a database, maintained by NIST, that is fully synchronized with the MITRE CVE list.

What information can you expect to find in the NVD entry for a given CVE ID? ›

The NVD catalogs vulnerabilities based on the Common Vulnerabilities and Exposures (CVE) naming standard. Each CVE entry contains important metadata like descriptions, severity scores, and references to related advisories or solutions.

Does every vulnerability get assigned a CVE? ›

The intention of the CVE Program is to be comprehensive with respect to all publicly known vulnerabilities. While CVE prioritizes the assignment of CVE Records for the vendors, products, and product categories listed on the List of Partners page, a CVE ID may be requested for any vulnerability.

What are the three elements that make up a CVE entry? ›

A CVE entry describes a known vulnerability or exposure. Each CVE entry contains a standard identifier number with status indicator (i.e. "CVE-1999-0067", "CVE-2014-12345", "CVE-2016-7654321"), a brief description and references related vulnerability reports and advisories. Each CVE ID is formatted as CVE-YYYY-NNNNN.

Who would dispute a CVE? ›

Incomplete information: A Published CVE Record may lack sufficient information for the vulnerability to be re-created by a CVE Program stakeholder. In this case, the technology vendor, maintainer, or third party may dispute the CVE Record.

How many vulnerabilities are in NVD? ›

NVD Contains
CVE Vulnerabilities258636
Checklists791
US-CERT Alerts249
US-CERT Vuln Notes4486
OVAL Queries10286
1 more row

What is going on with NVD? ›

The National Vulnerability Database is so overwhelmed with a steadily increasing number of software and hardware flaws that the National Institute of Standards and Technology, which maintains the common vulnerabilities and exposures repository, called for a slight pause to regroup and reprioritize its efforts.

When would you use the NVD? ›

The NVD provides critical information such as Common Vulnerability Scoring System (CVSS) scores, applicability assertions, and Common Platform Enumeration (CPE) data. By leveraging the NVD, organisations can prioritise and address vulnerabilities effectively, strengthening their IT infrastructure's security.

How often is NVD updated? ›

The "year" feeds are updated once per day, while the "recent" and "modified" feeds are updated every two hours. The NVD plans to retire all legacy data feeds while guiding any remaining data feed users to updated application-programming interfaces (APIs).

Why would the NVD be useful to you if you were a security officer at a large firm in the US? ›

The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What does NVD do? ›

The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What are the limitations of CVE? ›

Very little information—by design, the CVE is intended to serve as a vulnerability database. It provides only an ID, a brief description, and references for more information. It does not include all information required to run a complete vulnerability management program.

Who assigns CVE scores? ›

The CVE Assignment and Vetting Process

CVE IDs are assigned by the CVE Assignment Team and CNAs. The diversity of CNAs provides varied yet specific areas of expertise for different types of vulnerabilities. Each CNA is able to reserve a CVE ID when the need arises.

What are the criteria for CVE? ›

CVE IDs are assigned to flaws that meet a specific set of criteria. They must be fixed independently of any other bugs, they must be acknowledged by the vendor as having a negative impact on security, and they must be affecting only one codebase. Flaws that impact more than one product get separate CVEs.

What is a CVE threat? ›

Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. The CVE threat list is maintained by the MITRE Corporation, a nonprofit organization that runs U.S. federal government-sponsored research and development centers.

What is the purpose of common vulnerabilities and exposures CVE standard in a network? ›

The CVE (Common Vulnerabilities and Exposures) process is a standardized method for identifying and naming cybersecurity vulnerabilities. It provides a unique identifier for each vulnerability, along with a detailed description of the issue and information on how to mitigate the risk.

What are common tactics used by threat actors to compromise your computer? ›

Common capabilities a threat actor can use include:

Malware development and deployment (viruses, ransomware, trojans), or ransomware-as-a-service. Exploitation of software vulnerabilities. Phishing attacks and social engineering in order to gain access to passwords.

What are some examples of threat actors select all that apply? ›

Threat actors are often categorized into different types based on their motivation and to a lesser degree, their level of sophistication.
  • Cybercriminals. These individuals or groups commit cybercrimes mostly for financial gain. ...
  • Nation-state actors. ...
  • Hacktivists. ...
  • Thrill seekers. ...
  • Insider threats. ...
  • Cyberterrorists.

Top Articles
USD To MXN: Convert United States Dollar to Mexican Peso - Forbes Advisor
A Guide to Yield Farming's Risk and Rewards
Craigslist Cars Augusta Ga
Txtvrfy Sheridan Wy
Top Financial Advisors in the U.S.
Gunshots, panic and then fury - BBC correspondent's account of Trump shooting
Simple Steamed Purple Sweet Potatoes
How Many Slices Are In A Large Pizza? | Number Of Pizzas To Order For Your Next Party
Cooking Fever Wiki
Clarksburg Wv Craigslist Personals
2015 Honda Fit EX-L for sale - Seattle, WA - craigslist
Procore Championship 2024 - PGA TOUR Golf Leaderboard | ESPN
Aldi Sign In Careers
WEB.DE Apps zum mailen auf dem SmartPhone, für Ihren Browser und Computer.
Craigslist Southern Oregon Coast
Hennens Chattanooga Dress Code
Silive Obituary
Busted Mcpherson Newspaper
Doublelist Paducah Ky
Craigslist Battle Ground Washington
Dove Cremation Services Topeka Ks
Xxn Abbreviation List 2017 Pdf
Bolly2Tolly Maari 2
O'reilly's In Mathis Texas
Lacey Costco Gas Price
Pioneer Library Overdrive
950 Sqft 2 BHK Villa for sale in Devi Redhills Sirinium | Red Hills, Chennai | Property ID - 15334774
Alternatieven - Acteamo - WebCatalog
Greyson Alexander Thorn
Citibank Branch Locations In Orlando Florida
Homewatch Caregivers Salary
Stolen Touches Neva Altaj Read Online Free
Roch Hodech Nissan 2023
2008 Chevrolet Corvette for sale - Houston, TX - craigslist
Trivago Myrtle Beach Hotels
Captain Billy's Whiz Bang, Vol 1, No. 11, August, 1920
America's Magazine of Wit, Humor and Filosophy
Emily Tosta Butt
Brandon Spikes Career Earnings
Sofia With An F Mugshot
Lamont Mortuary Globe Az
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Mauston O'reilly's
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
9294027542
Craigslist Pets Charleston Wv
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Solving Quadratics All Methods Worksheet Answers
Electric Toothbrush Feature Crossword
Wvu Workday
Vrca File Converter
Gameplay Clarkston
Haunted Mansion Showtimes Near The Grand 14 - Ambassador
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 5937

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.