What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2024)

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (1)

By

  • Rahul Awati

What are Common Vulnerabilities and Exposures (CVE)?

Common Vulnerabilities and Exposures (CVE) is a publicly listed catalog of known security threats. The catalog is sponsored by the United States Department of Homeland Security (DHS), and threats are divided into two categories: vulnerabilities and exposures.

Its cumbersome name notwithstanding, the CVE is simply a list of known cybersecurity vulnerabilities. To qualify for addition to the CVE, a vulnerability or flaw must be fixable independently of other flaws, acknowledged by a vendor to have a negative impact on security (currently or sometime in the future) and it must affect only one codebase (i.e., one product).

The list, which is maintained by the MITRE Corporation and supported by DHS's Cybersecurity and Infrastructure Security Agency (CISA), identifies, defines and publicly discloses cybersecurity vulnerabilities. This information can help enterprise security teams to better understand their organization's threat landscape and implement appropriate controls to mitigate known threats.

All publicly known cybersecurity vulnerabilities in the CVE contain an identification number (CVE ID), a description and one or more public references. Hundreds or thousands of CVE IDs are issued every year to account for the number of new vulnerabilities that are discovered each year.

This article is part of

What is patch management? Lifecycle, benefits and best practices

  • Which also includes:
  • Creating a patch management policy: Step-by-step guide
  • Key software patch testing best practices
  • 10 enterprise patch management best practices

The ID and description are part of the CVE record. Each vulnerability in the CVE catalog has one CVE record. CVE records are provided in multiple human and machine-readable formats.

When an organization reports a vulnerability to the CVE, it requests a CVE ID. The responsible CVE numbering authority (CNA) reserves the CVE ID. But before publicly disclosing the vulnerability, the CNA identifies the minimum required data elements for a CVE record and then confirms the reported vulnerability. It's only after the CNA's confirmation that the record is published to the CVE list.

What is a vulnerability in the CVE?

In the context of the CVE, a vulnerability refers to any flaw in a software, firmware, hardware or service component that can be exploited by a cybercriminal or other threat actors. The exploitation of a vulnerability can happen if an organization knows about it but fails to eliminate it through appropriate security measures. If the vulnerability is exploited, it may negatively impact the confidentiality, integrity or availability of the impacted component, and may hinder an organization's operations or data.

What is the goal of Common Vulnerabilities and Exposures?

The catalog's main purpose is to standardize the way each known vulnerability or exposure is identified. This is important because standard IDs allow security administrators to quickly access technical information about a specific threat across multiple CVE-compatible information sources.

Information technology and cybersecurity specialists can use the CVE and its records to understand, prioritize and address the vulnerabilities that exist in their organizations. They can also use the CVE to engage in useful discussions with colleagues and to coordinate their mitigation efforts.

What is the Common Vulnerability Scoring System (CVSS)?

The CVSS is one of many efforts that are related to but separate from the CVE. It provides a systematic method to understand a known vulnerability and quantify its severity as measured by a numerical score. The U.S. National Vulnerability Database (NVD) provides a CVSS calculator that enables security teams to create severity rating scores and prioritize CVE records.

Security teams can use the CVSS and CVSS calculator to score the severity of software vulnerabilities identified by CVE records. They can then convert the quantitative severity into a qualitative expression, such as low/medium/high/critical in order to prioritize vulnerability remediation activities, and to assess and improve their vulnerability management abilities.

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2)

What is the difference between Common Vulnerabilities and Exposures and Common Weakness Enumeration?

Common Vulnerabilities and Exposures (CWE) is the catalog of known vulnerabilities whereas Common Weakness Enumeration is a list of various types of software and hardware weaknesses. Simply put, the CWE lists weaknesses that may lead to a vulnerability.

Unlike the CVE, the CWE acts as a type of dictionary that enumerates the types of flaws in software/hardware architecture, design, code or implementation. These flaws might result in exploitable security vulnerabilities. Once known, these vulnerabilities make their way into the CVE.

Examples of software weaknesses that might lead to the introduction of vulnerabilities include the following:

  • Buffer overflows.
  • Manipulations of common special elements.
  • Channel and path errors.
  • Handler errors.
  • User interface errors.
  • Authentication errors.
  • Code evaluation and injection.

Examples of hardware weaknesses that may lead to the introduction of vulnerabilities include the following:

  • Core and compute issues in CPUs or graphics processors.
  • Privilege separation and access control issues.
  • Shared resources.
  • Power and clock concerns.

CVE numbering authority (CNA) and root

A CVE numbering authority or CNA is any entity -- vendor, researcher, bug bounty provider organization, Computer Emergency Response Team, etc. -- that is given a coverage scope and the authority to both assign CVE IDs to vulnerabilities and publish CVE records. Scope refers to the CNA's specific responsibility for vulnerability identification, descriptions, referencing and publishing (on the CVE website) for the blocks of CVEs assigned to them.

A CNA must be authorized by the CVE program to be able to assign IDs and publish records. To be authorized, the CNA must have a public vulnerability disclosure policy and a public source for new vulnerability disclosures (to the CVE list).

In the CVE program, a Root refers to an organization authorized to recruit, train and govern one or more CNAs or other Roots. A Top-Level Root (TL-Root) is a Root that does not report to another Root and is responsible only to the CVE Board.

Explore the top 12 online cybersecurity courses and 10 cybersecurity certifications to boost your career. See how to fix the top five cybersecurity vulnerabilities and how to prevent 12 cybersecurity risks of remote work. Check out how, when and why to use incident response tools and how to build an incident response plan.

This was last updated in November 2023

Continue Reading About Common Vulnerabilities and Exposures (CVE)

  • Types of vulnerability scanning and when to use each
  • Why cloud bugs don't get CVEs, and why it's an issue
  • How to build a vulnerability scanner with PowerShell

Related Terms

What is a computer exploit?
A computer exploit, or exploit, is a program or piece of code developed to take advantage of a vulnerability in a computer or ...Seecompletedefinition
What is exposure management?
Exposure management is a cybersecurity approach to protecting exploitable IT assets.Seecompletedefinition
What is malware? Prevention, detection and how attacks work
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

  • Critical Progress Telerik vulnerability under attackBy: ArielleWaldman
  • HC3 alerts hospitals of cybersecurity vulnerabilities in blood pressure monitorBy: JillMcKeon
  • Common Vulnerability Scoring System (CVSS)By: KinzaYasar
  • Palo Alto Networks discloses RCE zero-day vulnerabilityBy: RobWright
What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget (2024)

FAQs

What is Common Vulnerabilities and Exposures (CVE)? | Definition from TechTarget? ›

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats and each entry in that catalog has a corresponding CVSS score.

What are the Common Vulnerabilities and Exposures in the CVE system? ›

Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues. A CVE number uniquely identifies one vulnerability from the list.

What is the most common CVE? ›

The most exploited vulnerabilities in 2022
  • CVE-2020-1938 (GhostCat)
  • CVE-2018-2894. ...
  • CVE-2019-8442. ...
  • CVE-2021-26086. ...
  • CVE-2020-14179. ...
  • CVE-2018-13379. ...
  • CVE-2021-44228 (Log4j or Log4Shell) ...
  • CVE-2021-34473 (ProxyShell) ...

Which are common vulnerabilities and exposure CVE public repositories? ›

Common Vulnerabilities and Exposures (CVE) generally refers to the CVE list, a publicly disclosed catalog of information security vulnerabilities established and maintained by the MITRE Corporation. The CVE catalog is more like a dictionary than a CVE database.

Which of the following best describes what common vulnerability and exposure CVE is? ›

Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed information security vulnerabilities and exposures.

What is a CVE example? ›

One example would be a loosely secured cloud storage system that allows attackers to access sensitive data. Another example would be an open network port on a server which is further exploited through the installation of command and control malware.

What is a CVE threat? ›

Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. The CVE threat list is maintained by the MITRE Corporation, a nonprofit organization that runs U.S. federal government-sponsored research and development centers.

Which is the top most common vulnerability? ›

With this in mind, let's explore 10 common internet vulnerability issues.
  • Injection Flaws. ...
  • Broken Authentication. ...
  • Cross-Site Scripting (XSS) ...
  • Insecure Direct Object References. ...
  • Security Misconfiguration. ...
  • Sensitive data exposure. ...
  • Missing Function Level Access Control. ...
  • Cross-Site Request Forgery (CSRF)

Do all vulnerabilities have a CVE? ›

The intention of the CVE Program is to be comprehensive with respect to all publicly known vulnerabilities. While CVE prioritizes the assignment of CVE Records for the vendors, products, and product categories listed on the List of Partners page, a CVE ID may be requested for any vulnerability.

What qualifies as a CVE? ›

To qualify for addition to the CVE, a vulnerability or flaw must be fixable independently of other flaws, acknowledged by a vendor to have a negative impact on security (currently or sometime in the future) and it must affect only one codebase (i.e., one product).

Do hackers use CVE? ›

They scour the CVE's details to identify vulnerabilities that can be exploited in target systems, then develop or adapt exploit tools to take advantage of these weaknesses. Then they actively search for systems that have not yet applied patches or mitigations — making them easy targets for intrusion.

Why is CVE important? ›

CVE plays a significant role in security management by providing a standardized way to identify and track vulnerabilities across different platforms and software applications. It acts as a dictionary of vulnerabilities, assigning unique identifiers to each known vulnerability.

Who would dispute a CVE? ›

Incomplete information: A Published CVE Record may lack sufficient information for the vulnerability to be re-created by a CVE Program stakeholder. In this case, the technology vendor, maintainer, or third party may dispute the CVE Record.

What are the Common Vulnerabilities and Exposures in the CVE glossary? ›

The CVE glossary contains a list of entries, each including a unique ID number, public reference, and description. Each CVE refers to a specific exposure or vulnerability, defined as follows: A security vulnerability—an error in software code that provides threat actors with direct access to a network or system.

What is the purpose of Common Vulnerabilities and Exposures CVE standard in a network? ›

The CVE (Common Vulnerabilities and Exposures) process is a standardized method for identifying and naming cybersecurity vulnerabilities. It provides a unique identifier for each vulnerability, along with a detailed description of the issue and information on how to mitigate the risk.

What are the risk factors for CVE? ›

Factors such as age, high cholesterol, smoking, high blood pressure, diabetes, and chronic kidney disease are the main risk factors for a heart attack.

What is the Common Vulnerabilities and Exposures CVE used by the MITRE Corporation? ›

Common Vulnerabilities and Exposures (CVE) is a comprehensive list of publicly disclosed information security vulnerabilities and exposures. It was launched in 1999 by the MITRE Corporation, a nonprofit organization that operates federally funded research and development centers in the United States.

Who maintains the Common Vulnerabilities and Exposures CVE list? ›

MITRE Corporation. The CVE list is a dictionary-style reference for publicly known cybersecurity vulnerabilities and exposures. It is developed and maintained by the MITRE Corporation and used by organizations worldwide to prioritize and coordinate efforts to address vulnerabilities in software and systems.

What are the 4 main types of security vulnerability? ›

What are the 4 major types of security vulnerability?
  • Process (or procedural) vulnerabilities.
  • Operating system vulnerabilities.
  • Network vulnerabilities.
  • Human vulnerabilities.
Jan 12, 2024

Top Articles
Parasites
Yield vs. Total Return: What's the Difference?
Mybranch Becu
123 Movies Black Adam
Zabor Funeral Home Inc
Fat Hog Prices Today
Missed Connections Inland Empire
The 10 Best Restaurants In Freiburg Germany
Bloxburg Image Ids
Noaa Weather Philadelphia
Palace Pizza Joplin
Erskine Plus Portal
Nwi Arrests Lake County
Craigslist Free Stuff Santa Cruz
Extra Virgin Coconut Oil Walmart
라이키 유출
Kylie And Stassie Kissing: A Deep Dive Into Their Friendship And Moments
Officialmilarosee
Foxy Brown 2025
Vigoro Mulch Safe For Dogs
Understanding Genetics
Breckie Hill Mega Link
Air Quality Index Endicott Ny
Canvasdiscount Black Friday Deals
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
Wkow Weather Radar
Best Boston Pizza Places
Essence Healthcare Otc 2023 Catalog
Workshops - Canadian Dam Association (CDA-ACB)
My Reading Manga Gay
Taylored Services Hardeeville Sc
Florence Y'alls Standings
Hannah Jewell
Scat Ladyboy
3 Bedroom 1 Bath House For Sale
Grandstand 13 Fenway
Jambus - Definition, Beispiele, Merkmale, Wirkung
Appleton Post Crescent Today's Obituaries
Wbli Playlist
Ducky Mcshweeney's Reviews
How to Destroy Rule 34
Manatee County Recorder Of Deeds
Poe Flameblast
Gym Assistant Manager Salary
Traumasoft Butler
The Complete Uber Eats Delivery Driver Guide:
Ouhsc Qualtrics
Benjamin Franklin - Printer, Junto, Experiments on Electricity
Rocket Bot Royale Unblocked Games 66
Razor Edge Gotti Pitbull Price
Southwind Village, Southend Village, Southwood Village, Supervision Of Alcohol Sales In Church And Village Halls
Lsreg Att
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5645

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.