NVD - CVE FAQs (2024)

  1. What is the CVE Lifecycle?
  2. What are CVE Statuses in NVD?
  3. What does it mean when a CVE status says "Modified"?
  4. If a CVE has been remediated can it be removed from the NVD?
  5. How do I request a change to a CVE description or reference links?
  6. What are reference tags?
  7. How does the CVSS calculation work and where is it from?
  8. How should I use CVSS scores provided by NVD?
  9. How do I dispute a CVSS vector string provided by NVD?
  10. Why don’t scores provided by NVD match scores provided by vendors or other parties?
  11. Have all older CVEs been updated to CVSSv3?
  12. Why does the NVD not contain a CVE-ID that is publicly disclosed?

Q.

What is the CVE Lifecycle?

A.

Vulnerabilities are identified by CVE Numbering Authorities (CNA), individuals, or organizations and reported to the CVE Program. When a vulnerability is identified, the CVE Assignment Team or CNA may assign the vulnerability a CVE Identifier (CVE-ID). A determination is then made by the CNA or CVE Assignment Team to publish the information for the CVE, changing the CVE in the Official CVE List from being marked **RESERVED** to having a published CVE Description and Reference links.

The National Vulnerability Database (NVD) is tasked with enriching each CVE once it has been published to the CVE List. NVD enrichment efforts use the reference information provided with the CVE and any publicly available information at the time of enrichment to associate Reference Tags, Common Vulnerability Scoring System (CVSS) v4.0, CVSS v3.1 base metrics, CWE, and CPE Applicability statements.

Q.

What are CVE Statuses in NVD?

A.

The NVD includes statuses for both the NVD and CVE Program workflows. For details on the statuses that each organization uses please reference nvd.nist.gov/vuln/vulnerability-status.

A.

Once a CVE is in the NVD, enrichment efforts can begin. After enrichment is complete, CVE data may be updated (modified). If modification occurs, the NVD will automatically refresh any associated CVE records. The NVD publishes a changelog for every CVE that may be accessed on the CVE record’s detail page or the Change History API.

If the CVE changes to the REJECTED status in the CVE List, the NVD record will also change to REJECTED and any previously associated data will be removed except for the CVE Description. The CVE Description is then be updated to reflect what information is present in the CVE List as rejected CVE descriptions explain the rejection.

Q.

If a CVE has been remediated can it be removed from the NVD?

A.

No. If a vulnerability has been remediated, it still exists in unpatched code. Similarly, vulnerabilities that are marked as rejected in the CVE Assignment Team or CNAs also remain in the database.

Q.

How do I request a change to a CVE description or reference links?

A.

The NVD does not have direct control over CVE descriptions or reference links provided by the CVE List. You will need to contact the CVE Assignment Team using the form at cveform.mitre.org. Changes from the CVE List to a CVE already published in the NVD will be populated on the website and API within 24 hours.

Q.

What are reference tags?

A.

NVD enrichment efforts associate reference tags (e.g., Vendor Advisory, Patch, Third Party Advisory) to CVE reference links provided in the CVE List. Reference tags categorize the links and help make sense of the information.

Q.

How does the CVSS calculation work and where is it from?

A.

CVSS is an industry standard used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS v2.0, 3.0 and 3.1 consist of three metric groups: Base, Temporal, and Environmental. CVSS v4.0 consists of four metric groups: Base, Threat, Environmental and Supplemental.Each is maintained by the FIRST CVSS Special Interest Group (SIG). NVD's CVSS calculator is implemented according to the specification found at first.org/cvss/specification-document.

The NVD also offers the public CVSS calculators for CVSS v2.0, v3.0, v3.1 and v4.0. The CVSS v3 calculator page contains buttons which allow users to toggle between CVSS v3.0 and 3.1 equations.

nvd.nist.gov/vuln-metrics/cvss/v2-calculator

nvd.nist.gov/vuln-metrics/cvss/v3-calculator

nvd.nist.gov/vuln-metrics/cvss/v4-calculator

Q.

How should I use CVSS scores provided by NVD?

A.

NVD enrichment efforts provide CVSS Vector strings for base metrics that produce a score ranging from 0 to 10, which can then be modified by assessing the Temporal and Environmental metrics. Organizations can use this information, along with their own individualized Temporal and Environmental vectors and metrics, to determine an overall score. The overall score can then be used in ranking the severity of vulnerabilities associated with the organization’s information systems and help to determine mitigation strategies.

Q.

How do I dispute a CVSS vector string provided by NVD?

A.

Any issues regarding the data associated by NVD enrichment efforts can be disputed by contacting NVD staff using ourcontact form.

Q.

Why don’t scores provided by NVD match scores provided by vendors or other parties?

A.

The NVD assesses CVEs using publicly available information at the time of enrichment. To ensure that the vector strings in the NVD reflect publicly available information and abide by CVSS specification guidelines, CVSS vector strings provided by third parties are not copied outright. This can lead to differences in CVSS vector strings between different parties. Usually NVD and vendor/third party vector strings differ due to information being overly vague or unavailable at the time of enrichment. If you believe that a CVSS vector string should be revised, please contact the NVD using ourcontact form and provide publicly available information that corroborates any claims.

Q.

Have all older CVEs been updated to CVSSv3?

A.

The NVD is prioritizes the enrichment of new vulnerabilities or vulnerabilities that have changed since their last enrichment. At this time, there are no plans to retroactively assess vulnerabilities published before Dec 20, 2015 with CVSS v3.0 scores.

A similar approach is planned for after the release of CVSSv4.

Q.

Why does the NVD not contain a CVE-ID that is publicly disclosed?

A.

Third-party organizations may release advisories regarding a CVE-ID prior to that CVE being published in the CVE List. The CVE Program refers to these as “Reserved but Public” (RBP). The NVD does not participate in the vulnerability disclosure or the CVE publication process. CVEs are typically available in the NVD within an hour of being published to the CVE List. If you have further questions, please contact the CVE Assignment Team directly atcveform.mitre.org.


Created September 20, 2022 , Updated June 27, 2024

NVD - CVE FAQs (2024)

FAQs

How would you answer the argument that threat actors could use CVE? ›

I would say that threat actors can use CVE as a way of information about vulnerabilities. But I'd say it is also important to note that CVE's main purpose would be to strengthen cybersecurity. Scroll down to CVE List Basics . What is the process by which a vulnerability becomes a CVE listing?

What is the difference between CVE and NVD? ›

CVE – Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed vulnerabilities and exposures that is maintained by MITRE. NVD – The National Vulnerability Database (NVD) is a database, maintained by NIST, that is fully synchronized with the MITRE CVE list.

What information can you expect to find in the NVD entry for a given CVE ID? ›

The NVD catalogs vulnerabilities based on the Common Vulnerabilities and Exposures (CVE) naming standard. Each CVE entry contains important metadata like descriptions, severity scores, and references to related advisories or solutions.

Does every vulnerability get assigned a CVE? ›

The intention of the CVE Program is to be comprehensive with respect to all publicly known vulnerabilities. While CVE prioritizes the assignment of CVE Records for the vendors, products, and product categories listed on the List of Partners page, a CVE ID may be requested for any vulnerability.

What are the three elements that make up a CVE entry? ›

A CVE entry describes a known vulnerability or exposure. Each CVE entry contains a standard identifier number with status indicator (i.e. "CVE-1999-0067", "CVE-2014-12345", "CVE-2016-7654321"), a brief description and references related vulnerability reports and advisories. Each CVE ID is formatted as CVE-YYYY-NNNNN.

Who would dispute a CVE? ›

Incomplete information: A Published CVE Record may lack sufficient information for the vulnerability to be re-created by a CVE Program stakeholder. In this case, the technology vendor, maintainer, or third party may dispute the CVE Record.

How many vulnerabilities are in NVD? ›

NVD Contains
CVE Vulnerabilities258636
Checklists791
US-CERT Alerts249
US-CERT Vuln Notes4486
OVAL Queries10286
1 more row

What is going on with NVD? ›

The National Vulnerability Database is so overwhelmed with a steadily increasing number of software and hardware flaws that the National Institute of Standards and Technology, which maintains the common vulnerabilities and exposures repository, called for a slight pause to regroup and reprioritize its efforts.

When would you use the NVD? ›

The NVD provides critical information such as Common Vulnerability Scoring System (CVSS) scores, applicability assertions, and Common Platform Enumeration (CPE) data. By leveraging the NVD, organisations can prioritise and address vulnerabilities effectively, strengthening their IT infrastructure's security.

How often is NVD updated? ›

The "year" feeds are updated once per day, while the "recent" and "modified" feeds are updated every two hours. The NVD plans to retire all legacy data feeds while guiding any remaining data feed users to updated application-programming interfaces (APIs).

Why would the NVD be useful to you if you were a security officer at a large firm in the US? ›

The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What does NVD do? ›

The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What are the limitations of CVE? ›

Very little information—by design, the CVE is intended to serve as a vulnerability database. It provides only an ID, a brief description, and references for more information. It does not include all information required to run a complete vulnerability management program.

Who assigns CVE scores? ›

The CVE Assignment and Vetting Process

CVE IDs are assigned by the CVE Assignment Team and CNAs. The diversity of CNAs provides varied yet specific areas of expertise for different types of vulnerabilities. Each CNA is able to reserve a CVE ID when the need arises.

What are the criteria for CVE? ›

CVE IDs are assigned to flaws that meet a specific set of criteria. They must be fixed independently of any other bugs, they must be acknowledged by the vendor as having a negative impact on security, and they must be affecting only one codebase. Flaws that impact more than one product get separate CVEs.

What is a CVE threat? ›

Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. The CVE threat list is maintained by the MITRE Corporation, a nonprofit organization that runs U.S. federal government-sponsored research and development centers.

What is the purpose of common vulnerabilities and exposures CVE standard in a network? ›

The CVE (Common Vulnerabilities and Exposures) process is a standardized method for identifying and naming cybersecurity vulnerabilities. It provides a unique identifier for each vulnerability, along with a detailed description of the issue and information on how to mitigate the risk.

What are common tactics used by threat actors to compromise your computer? ›

Common capabilities a threat actor can use include:

Malware development and deployment (viruses, ransomware, trojans), or ransomware-as-a-service. Exploitation of software vulnerabilities. Phishing attacks and social engineering in order to gain access to passwords.

What are some examples of threat actors select all that apply? ›

Threat actors are often categorized into different types based on their motivation and to a lesser degree, their level of sophistication.
  • Cybercriminals. These individuals or groups commit cybercrimes mostly for financial gain. ...
  • Nation-state actors. ...
  • Hacktivists. ...
  • Thrill seekers. ...
  • Insider threats. ...
  • Cyberterrorists.

Top Articles
Return on Investment and Return on Equity | Learn and Solve Questions
How to Measure Static Electricity (with Pictures) - wikiHow
WALB Locker Room Report Week 5 2024
Design215 Word Pattern Finder
Cottonwood Vet Ottawa Ks
Nehemiah 4:1–23
Tesla Supercharger La Crosse Photos
Katmoie
Bloxburg Image Ids
Capitulo 2B Answers Page 40
World History Kazwire
United Dual Complete Providers
R/Afkarena
Bowie Tx Craigslist
Dr. med. Uta Krieg-Oehme - Lesen Sie Erfahrungsberichte und vereinbaren Sie einen Termin
Conan Exiles Colored Crystal
SXSW Film & TV Alumni Releases – July & August 2024
1v1.LOL - Play Free Online | Spatial
Andhrajyothy Sunday Magazine
Weepinbell Gen 3 Learnset
2024 INFINITI Q50 Specs, Trims, Dimensions & Prices
Teen Vogue Video Series
Talkstreamlive
Poochies Liquor Store
Core Relief Texas
Airg Com Chat
Proto Ultima Exoplating
Alima Becker
La Qua Brothers Funeral Home
47 Orchid Varieties: Different Types of Orchids (With Pictures)
Mg Char Grill
Gyeon Jahee
Desirulez.tv
Hannibal Mo Craigslist Pets
Eastern New Mexico News Obituaries
Cal Poly 2027 College Confidential
Bianca Belair: Age, Husband, Height & More To Know
Verizon Outage Cuyahoga Falls Ohio
Letter of Credit: What It Is, Examples, and How One Is Used
Senior Houses For Sale Near Me
Blow Dry Bar Boynton Beach
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
The Complete Uber Eats Delivery Driver Guide:
Noga Funeral Home Obituaries
Colin Donnell Lpsg
Theater X Orange Heights Florida
Westport gun shops close after confusion over governor's 'essential' business list
Deshuesadero El Pulpo
Where and How to Watch Sound of Freedom | Angel Studios
Free Carnival-themed Google Slides & PowerPoint templates
Osrs Vorkath Combat Achievements
How Did Natalie Earnheart Lose Weight
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 5937

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.