What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2024)

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (1)

By

  • Rahul Awati

What are Common Vulnerabilities and Exposures (CVE)?

Common Vulnerabilities and Exposures (CVE) is a publicly listed catalog of known security threats. The catalog is sponsored by the United States Department of Homeland Security (DHS), and threats are divided into two categories: vulnerabilities and exposures.

Its cumbersome name notwithstanding, the CVE is simply a list of known cybersecurity vulnerabilities. To qualify for addition to the CVE, a vulnerability or flaw must be fixable independently of other flaws, acknowledged by a vendor to have a negative impact on security (currently or sometime in the future) and it must affect only one codebase (i.e., one product).

The list, which is maintained by the MITRE Corporation and supported by DHS's Cybersecurity and Infrastructure Security Agency (CISA), identifies, defines and publicly discloses cybersecurity vulnerabilities. This information can help enterprise security teams to better understand their organization's threat landscape and implement appropriate controls to mitigate known threats.

All publicly known cybersecurity vulnerabilities in the CVE contain an identification number (CVE ID), a description and one or more public references. Hundreds or thousands of CVE IDs are issued every year to account for the number of new vulnerabilities that are discovered each year.

This article is part of

What is patch management? Lifecycle, benefits and best practices

  • Which also includes:
  • Creating a patch management policy: Step-by-step guide
  • Key software patch testing best practices
  • 10 enterprise patch management best practices

The ID and description are part of the CVE record. Each vulnerability in the CVE catalog has one CVE record. CVE records are provided in multiple human and machine-readable formats.

When an organization reports a vulnerability to the CVE, it requests a CVE ID. The responsible CVE numbering authority (CNA) reserves the CVE ID. But before publicly disclosing the vulnerability, the CNA identifies the minimum required data elements for a CVE record and then confirms the reported vulnerability. It's only after the CNA's confirmation that the record is published to the CVE list.

What is a vulnerability in the CVE?

In the context of the CVE, a vulnerability refers to any flaw in a software, firmware, hardware or service component that can be exploited by a cybercriminal or other threat actors. The exploitation of a vulnerability can happen if an organization knows about it but fails to eliminate it through appropriate security measures. If the vulnerability is exploited, it may negatively impact the confidentiality, integrity or availability of the impacted component, and may hinder an organization's operations or data.

What is the goal of Common Vulnerabilities and Exposures?

The catalog's main purpose is to standardize the way each known vulnerability or exposure is identified. This is important because standard IDs allow security administrators to quickly access technical information about a specific threat across multiple CVE-compatible information sources.

Information technology and cybersecurity specialists can use the CVE and its records to understand, prioritize and address the vulnerabilities that exist in their organizations. They can also use the CVE to engage in useful discussions with colleagues and to coordinate their mitigation efforts.

What is the Common Vulnerability Scoring System (CVSS)?

The CVSS is one of many efforts that are related to but separate from the CVE. It provides a systematic method to understand a known vulnerability and quantify its severity as measured by a numerical score. The U.S. National Vulnerability Database (NVD) provides a CVSS calculator that enables security teams to create severity rating scores and prioritize CVE records.

Security teams can use the CVSS and CVSS calculator to score the severity of software vulnerabilities identified by CVE records. They can then convert the quantitative severity into a qualitative expression, such as low/medium/high/critical in order to prioritize vulnerability remediation activities, and to assess and improve their vulnerability management abilities.

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2)

What is the difference between Common Vulnerabilities and Exposures and Common Weakness Enumeration?

Common Vulnerabilities and Exposures (CWE) is the catalog of known vulnerabilities whereas Common Weakness Enumeration is a list of various types of software and hardware weaknesses. Simply put, the CWE lists weaknesses that may lead to a vulnerability.

Unlike the CVE, the CWE acts as a type of dictionary that enumerates the types of flaws in software/hardware architecture, design, code or implementation. These flaws might result in exploitable security vulnerabilities. Once known, these vulnerabilities make their way into the CVE.

Examples of software weaknesses that might lead to the introduction of vulnerabilities include the following:

  • Buffer overflows.
  • Manipulations of common special elements.
  • Channel and path errors.
  • Handler errors.
  • User interface errors.
  • Authentication errors.
  • Code evaluation and injection.

Examples of hardware weaknesses that may lead to the introduction of vulnerabilities include the following:

  • Core and compute issues in CPUs or graphics processors.
  • Privilege separation and access control issues.
  • Shared resources.
  • Power and clock concerns.

CVE numbering authority (CNA) and root

A CVE numbering authority or CNA is any entity -- vendor, researcher, bug bounty provider organization, Computer Emergency Response Team, etc. -- that is given a coverage scope and the authority to both assign CVE IDs to vulnerabilities and publish CVE records. Scope refers to the CNA's specific responsibility for vulnerability identification, descriptions, referencing and publishing (on the CVE website) for the blocks of CVEs assigned to them.

A CNA must be authorized by the CVE program to be able to assign IDs and publish records. To be authorized, the CNA must have a public vulnerability disclosure policy and a public source for new vulnerability disclosures (to the CVE list).

In the CVE program, a Root refers to an organization authorized to recruit, train and govern one or more CNAs or other Roots. A Top-Level Root (TL-Root) is a Root that does not report to another Root and is responsible only to the CVE Board.

Explore the top 12 online cybersecurity courses and 10 cybersecurity certifications to boost your career. See how to fix the top five cybersecurity vulnerabilities and how to prevent 12 cybersecurity risks of remote work. Check out how, when and why to use incident response tools and how to build an incident response plan.

This was last updated in November 2023

Continue Reading About Common Vulnerabilities and Exposures (CVE)

  • Types of vulnerability scanning and when to use each
  • Why cloud bugs don't get CVEs, and why it's an issue
  • How to build a vulnerability scanner with PowerShell

Related Terms

What is a computer exploit?
A computer exploit, or exploit, is a program or piece of code developed to take advantage of a vulnerability in a computer or ...Seecompletedefinition
What is exposure management?
Exposure management is a cybersecurity approach to protecting exploitable IT assets.Seecompletedefinition
What is malware? Prevention, detection and how attacks work
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

  • Critical Progress Telerik vulnerability under attackBy: ArielleWaldman
  • HC3 alerts hospitals of cybersecurity vulnerabilities in blood pressure monitorBy: JillMcKeon
  • Common Vulnerability Scoring System (CVSS)By: KinzaYasar
  • Palo Alto Networks discloses RCE zero-day vulnerabilityBy: RobWright
What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2024)

FAQs

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget? ›

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats and each entry in that catalog has a corresponding CVSS score.

What are the Common Vulnerabilities and Exposures in the CVE system? ›

Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues. A CVE number uniquely identifies one vulnerability from the list.

What is the most common CVE? ›

The most exploited vulnerabilities in 2022
  • CVE-2020-1938 (GhostCat)
  • CVE-2018-2894. ...
  • CVE-2019-8442. ...
  • CVE-2021-26086. ...
  • CVE-2020-14179. ...
  • CVE-2018-13379. ...
  • CVE-2021-44228 (Log4j or Log4Shell) ...
  • CVE-2021-34473 (ProxyShell) ...

Which are common vulnerabilities and exposure CVE public repositories? ›

Common Vulnerabilities and Exposures (CVE) generally refers to the CVE list, a publicly disclosed catalog of information security vulnerabilities established and maintained by the MITRE Corporation. The CVE catalog is more like a dictionary than a CVE database.

Which of the following best describes what common vulnerability and exposure CVE is? ›

Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed information security vulnerabilities and exposures.

What is a CVE example? ›

One example would be a loosely secured cloud storage system that allows attackers to access sensitive data. Another example would be an open network port on a server which is further exploited through the installation of command and control malware.

What is a CVE threat? ›

Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. The CVE threat list is maintained by the MITRE Corporation, a nonprofit organization that runs U.S. federal government-sponsored research and development centers.

Which is the top most common vulnerability? ›

With this in mind, let's explore 10 common internet vulnerability issues.
  • Injection Flaws. ...
  • Broken Authentication. ...
  • Cross-Site Scripting (XSS) ...
  • Insecure Direct Object References. ...
  • Security Misconfiguration. ...
  • Sensitive data exposure. ...
  • Missing Function Level Access Control. ...
  • Cross-Site Request Forgery (CSRF)

Do all vulnerabilities have a CVE? ›

The intention of the CVE Program is to be comprehensive with respect to all publicly known vulnerabilities. While CVE prioritizes the assignment of CVE Records for the vendors, products, and product categories listed on the List of Partners page, a CVE ID may be requested for any vulnerability.

What qualifies as a CVE? ›

To qualify for addition to the CVE, a vulnerability or flaw must be fixable independently of other flaws, acknowledged by a vendor to have a negative impact on security (currently or sometime in the future) and it must affect only one codebase (i.e., one product).

Do hackers use CVE? ›

They scour the CVE's details to identify vulnerabilities that can be exploited in target systems, then develop or adapt exploit tools to take advantage of these weaknesses. Then they actively search for systems that have not yet applied patches or mitigations — making them easy targets for intrusion.

Why is CVE important? ›

CVE plays a significant role in security management by providing a standardized way to identify and track vulnerabilities across different platforms and software applications. It acts as a dictionary of vulnerabilities, assigning unique identifiers to each known vulnerability.

Who would dispute a CVE? ›

Incomplete information: A Published CVE Record may lack sufficient information for the vulnerability to be re-created by a CVE Program stakeholder. In this case, the technology vendor, maintainer, or third party may dispute the CVE Record.

What are the Common Vulnerabilities and Exposures in the CVE glossary? ›

The CVE glossary contains a list of entries, each including a unique ID number, public reference, and description. Each CVE refers to a specific exposure or vulnerability, defined as follows: A security vulnerability—an error in software code that provides threat actors with direct access to a network or system.

What is the purpose of Common Vulnerabilities and Exposures CVE standard in a network? ›

The CVE (Common Vulnerabilities and Exposures) process is a standardized method for identifying and naming cybersecurity vulnerabilities. It provides a unique identifier for each vulnerability, along with a detailed description of the issue and information on how to mitigate the risk.

What are the risk factors for CVE? ›

Factors such as age, high cholesterol, smoking, high blood pressure, diabetes, and chronic kidney disease are the main risk factors for a heart attack.

What is the Common Vulnerabilities and Exposures CVE used by the MITRE Corporation? ›

Common Vulnerabilities and Exposures (CVE) is a comprehensive list of publicly disclosed information security vulnerabilities and exposures. It was launched in 1999 by the MITRE Corporation, a nonprofit organization that operates federally funded research and development centers in the United States.

Who maintains the Common Vulnerabilities and Exposures CVE list? ›

MITRE Corporation. The CVE list is a dictionary-style reference for publicly known cybersecurity vulnerabilities and exposures. It is developed and maintained by the MITRE Corporation and used by organizations worldwide to prioritize and coordinate efforts to address vulnerabilities in software and systems.

What are the 4 main types of security vulnerability? ›

What are the 4 major types of security vulnerability?
  • Process (or procedural) vulnerabilities.
  • Operating system vulnerabilities.
  • Network vulnerabilities.
  • Human vulnerabilities.
Jan 12, 2024

Top Articles
Adult Guardianship: When Is Someone Legally Incompetent?
21 Easy Side Hustles From Home to Make Money
UPS Paketshop: Filialen & Standorte
Lamb Funeral Home Obituaries Columbus Ga
Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
Best Restaurants In Seaside Heights Nj
Our History | Lilly Grove Missionary Baptist Church - Houston, TX
Natureza e Qualidade de Produtos - Gestão da Qualidade
Voyeuragency
How Many Cc's Is A 96 Cubic Inch Engine
Meritas Health Patient Portal
Jc Post News
Craigslist Farm And Garden Tallahassee Florida
Adam4Adam Discount Codes
Voy Boards Miss America
Jellyfin Ps5
Parentvue Clarkston
Craigslist Lakeville Ma
Atdhe Net
What Time Does Walmart Auto Center Open
Imouto Wa Gal Kawaii - Episode 2
Engineering Beauties Chapter 1
Kroger Feed Login
11526 Lake Ave Cleveland Oh 44102
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Was heißt AMK? » Bedeutung und Herkunft des Ausdrucks
Salons Open Near Me Today
Vip Lounge Odu
The Complete Guide To The Infamous "imskirby Incident"
Woodman's Carpentersville Gas Price
Thanksgiving Point Luminaria Promo Code
Weather Underground Bonita Springs
Cheetah Pitbull For Sale
Review: T-Mobile's Unlimited 4G voor Thuis | Consumentenbond
Wo ein Pfand ist, ist auch Einweg
Infinite Campus Farmingdale
Silive Obituary
Sun Tracker Pontoon Wiring Diagram
Bekah Birdsall Measurements
Alston – Travel guide at Wikivoyage
Satucket Lectionary
Powerboat P1 Unveils 2024 P1 Offshore And Class 1 Race Calendar
Juiced Banned Ad
26 Best & Fun Things to Do in Saginaw (MI)
Cult Collectibles - True Crime, Cults, and Murderabilia
Bf273-11K-Cl
Unpleasant Realities Nyt
Estes4Me Payroll
Philasd Zimbra
Predator revo radial owners
Bunbrat
login.microsoftonline.com Reviews | scam or legit check
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5645

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.