What is a CVE? Common Vulnerabilities and Exposures Explained | UpGuard (2024)

Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed information security vulnerabilities and exposures.

CVE was launched in 1999 by the MITRE corporation to identify and categorize vulnerabilities in software and firmware. CVE provides a free dictionary for organizations to improve their cyber security. MITRE is a nonprofit that operates federally funded research and development centers in the United States.

The Difference: Vulnerabilities vs. Exposures

A vulnerability is a weakness that can be exploited in a cyberattack to gain unauthorized access to or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access system memory, install different types of malware and steal, destroy or modify sensitive data.

An Exposure is a mistake that gives an attacker access to a system or network. Exposures can lead to data breaches, data leaks, and personally identifiable information (PII) being sold on the dark web.

In fact, some of the biggest data breaches were caused by accidental exposures rather than sophisticated cyber attacks.

What is the Goal of CVE?

The goal of CVE is to make it easier to share information about known vulnerabilities so that cybersecurity strategies can be updated with the latest security flaws and security issue

CVE does this by creating a standardized identifier for a given vulnerability or exposure. CVE identifiers (also called CVE names or CVE numbers) allow security professionals to access information about specific cyber threats across multiple information sources using the same common name.

For example, UpGuard is a CVE compatible product, and its reports reference CVE IDs. This allows you to find fix information on any CVE compatible vulnerability database.

What is the Common Vulnerability Scoring System (CVSS)?

The Common Vulnerability Scoring System (CVSS) is a set of open standards for assigning a number to a vulnerability to assess its severity. CVSS scores are used by the NVD, CERT, UpGuard and others to assess the impact of a vulnerability.

A CVSS score ranges from 0.0 to 10.0. The higher the number the higher degree of security severity.

Who Manages CVE?

MITRE maintains the CVE dictionary and CVE website, as well as the CVE Compatibility Program. The CVE Compatibility Program promotes the use of standard CVE identifiers issued by authorized CVE numbering authorities (CNAs).

Who Sponsors CVE?

CVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and US-CERT.

What are the Benefits of referring to CVEs?

The CVE database allows organizations to set a baseline for evaluating the coverage of their security tools. CVE's common identifiers allow organizations to see what each tool covers and how appropriate they are for your organization.

Security advisories can reference CVE vulnerability information to search for known attack signatures and remediate critical exploits as part of any digital forensics process.

Look for security tools with CVE compatibility rather than proprietary vulnerability assessments, it's a great way to reduce your organization's cybersecurity risk.

Is CVE a Vulnerability Database?

CVE isn't a vulnerability database. CVE is designed to allow vulnerability databases and other tools to be linked together. It also facilitates comparisons between security tools and services.

Check out the US National Vulnerability Database (NVD) that uses the CVE list identifiers and includes fix information, scoring and other information.

Does the CVE Database List All Known Vulnerabilities and Exposures?

CVE does not list all known vulnerabilities and exposures. The goal of CVE is to be comprehensive and it is. Given the scale of vulnerabilities and exposures, it's likely an impossible task for one system to contain everything.

Can Anyone Use CVE?

Yes, CVE is free to use and publicly accessible. CVE is designed to allow anyone to correlate data between different vulnerabilities, security tools, repositories and services.

Anyone can search, download, copy, redistribute, reference and analyze CVE as long as they don't modify any information.

What is a CVE Entry?

A CVE entry describes a known vulnerability or exposure.

Each CVE entry contains a standard identifier number with status indicator (i.e. "CVE-1999-0067", "CVE-2014-12345", "CVE-2016-7654321"), a brief description and references related vulnerability reports and advisories.

Each CVE ID is formatted as CVE-YYYY-NNNNN. The YYYY portion is the year the CVE ID was assigned or the year the vulnerability was made public.

Unlike vulnerability databases, CVE entries do not include risk, impact fix or other technical information.

Can Hackers Use CVE to Attack My Organization?

The short answer is yes but many cybersecurity professionals believe the benefits of CVE outweigh the risks:

  • CVE is restricted to publicly known vulnerabilities and exposures.
  • It improves the shareability of vulnerabilities and exposures within the cybersecurity community.
  • Organizations need to protect themselves and their networks by fixing all potential vulnerabilities and exposures while an attacker only needs to find a single vulnerability and exploit it to gain unauthorized access. This is why a list of known vulnerabilities is so valuable and an important part of network security.
  • The growing agreement for the cybersecurity community to share information is reducing the attack vector of many cyber attacks. This is reflected in widespread acceptance that the CVE Board and CVE Numbering Authorities (CNAs) are key organizations in cybersecurity.

As a concrete example, many believe the ransomware WannaCry, which spread through the EternalBlue vulnerability, would have had less impact if the vulnerability was publicly shared.

What is the CVE Board?

The CVE Board is comprised of cybersecurity organizations including security tool vendors, academia, research institutions, government departments and agencies, security experts and end-users of vulnerability information.

The CVE Board provides critical input regarding data sources, product coverage, coverage goals, operating structure and strategic direction of the CVE program.

All CVE Board discussions can be found via their email discussion archives and meeting archives. The CVE Board Character is also publicly accessible.

What are CNAs?

CVE Numbering Authorities (CNAs) are organizations that identify and distribute CVE id numbers to researchers and vendors for inclusion in public announcements of new vulnerabilities. CNAs include software vendors, open source projects, coordination centers, bug bounty service providers and research groups.

CNAs are a federated systems that helps identify vulnerabilities and assigns them an ID without directly involving MITRE which is the primary CNA.

Who are CNAs?

There are currently 104 CNAs in 18 countries including many household names like Microsoft, Adobe, Apple, Cisco, Google, Hewlett Packard Enterprise, Huawei, IBM, Intel, Mozilla, Oracle, Red Hat, Siemens, Symantec, VMWare, Atlassian, Autodesk, Cloudflare, Elastic, GitHub, Kubernetes, Netflix and Salesforce. You can see the full list of CVE numbering authorities here.

What is a Root CNA?

MITRE serves as the primary CNA while root CNAs cover a certain area or niche.

In many cases, a root CNA is when a major company - like Apple - posts vulnerabilities about its own products. In other cases, the root CNA may be focused on open source vulnerabilities.

Where is the Latest Version of the CVE list?

The latest version of the CVE list can always be found on cve.mitre.org. While the CVE list is free, it can be hard to know which vulnerabilities affect your organization without additional tools. This is why many organizations now use tools that monitor for changes in the CVE list that affect them.

New CVE identifiers are added daily. Look for sophisticated tools that automatically monitor you and your vendors for vulnerabilities. Managing third-party risks and fourth-party risks is a fundamental part of information risk management and your information security policy. Make vulnerability management part of your vendor risk management, third-party risk management framework and cyber security risk assessment processes.

How is a Vulnerability or Exposure Added to CVE?

CVEs are added when a researcher finds a flaw or design oversight in software or firmware. The vendor does not have to see it as a vulnerability for it to be listed as a CVE. That said, the researcher may be required to provide evidence of how it could be used as part of an exploit.

The stronger the claim, the more likely it will be added to CVE and the more likely it will have a high Common Vulnerability Scoring System score in vulnerability databases.

Potential CVEs reported by established vendors or other trusted parties will generally be added to the CVE list quickly.

Where to Learn More About CVEs

For an exhaustive list of answers to your CVE related questions, we recommend reading the CVE's Frequently Asked Questions.

What is a CVE? Common Vulnerabilities and Exposures Explained | UpGuard (2024)

FAQs

What is a CVE? Common Vulnerabilities and Exposures Explained | UpGuard? ›

Common Vulnerabilities and Exposures (CVE): System providing a reference method for publicly known information-security vulnerabilities and exposures (source). Vulnerability: Flaws in a computer system that weaken the overall security of the device/system (source).

What are the Common Vulnerabilities and Exposures in the CVE system? ›

Common Vulnerabilities and Exposures (CVE) is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities.

Which of the following best describes what common vulnerability and exposure CVE is? ›

Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed information security vulnerabilities and exposures.

What does CVE mean? ›

Common Vulnerabilities and Exposures (CVE) is a publicly listed catalog of known security threats. The catalog is sponsored by the United States Department of Homeland Security (DHS), and threats are divided into two categories: vulnerabilities and exposures.

What is the most common CVE? ›

List of Top 10 Exploited Vulnerabilities
  • ZeroLogon (CVE-2020-1472)
  • Log4Shell (CVE-2021-44228)
  • ICMAD (CVE-2022-22536)
  • ProxyLogon (CVE-2021-26855)
  • Spring4Shell (CVE-2022-22965)
  • Atlassian Confluence RCE (CVE-2022-26134)
  • VMware vSphere (CVE-2021-21972)
  • Google Chrome Zero-Day (CVE-2022-0609)
Dec 22, 2023

Which are common vulnerabilities and exposure CVE public repositories? ›

Common Vulnerabilities and Exposures (CVE) is a list that records publicly disclosed software vulnerabilities, as the name suggests. It is a dictionary that aims to facilitate data distribution across separate vulnerability databases and security tools. CVE is not a database of vulnerabilities in and of itself.

Why is CVE important? ›

CVE plays a crucial role in cybersecurity by acting as a central repository of vulnerability information. Without CVE, there would be confusion and inefficiency in addressing security issues. Cyberattacks often target these common vulnerabilities to exploit the weaknesses for unauthorized access or data breaches.

What is the difference between vulnerability and exposure? ›

Exposure – the location, attributes, and value of assets that are important to communities (people, buildings, factories, farmland, etc.) and that could be affected by a hazard. Vulnerability – the likelihood that assets will be damaged/destroyed/affected when exposed to a hazard.

What is a common vulnerability and exposure and why is it significant to an information security practitioner? ›

A CVE Identifier is a unique identifier assigned to publicly known cybersecurity vulnerabilities. It is a standardized method of naming these vulnerabilities to make it easier for security researchers, vendors, and organizations to communicate and share information about them.

Does every vulnerability have a CVE? ›

No. This information can already be found in numerous vulnerability websites, databases, and security tool databases. CVE does not have this information because CVE is intended to link these different vulnerability capabilities, not to replace them.

Which is the top most common vulnerability? ›

With this in mind, let's explore 10 common internet vulnerability issues.
  • Injection Flaws. ...
  • Broken Authentication. ...
  • Cross-Site Scripting (XSS) ...
  • Insecure Direct Object References. ...
  • Security Misconfiguration. ...
  • Sensitive data exposure. ...
  • Missing Function Level Access Control. ...
  • Cross-Site Request Forgery (CSRF)

What is your biggest vulnerability? ›

For most people, either fear (of harm, isolation, deprivation) or shame (of failure) constitutes their core vulnerability. Fear and shame are both pretty dreadful, to be sure. Though no one wants to experience either for very long, one is usually worse than the other for most individuals.

Do hackers use CVE? ›

They scour the CVE's details to identify vulnerabilities that can be exploited in target systems, then develop or adapt exploit tools to take advantage of these weaknesses. Then they actively search for systems that have not yet applied patches or mitigations — making them easy targets for intrusion.

What is the Common Vulnerabilities and Exposures CVE used by the Mitre Corporation? ›

Common Vulnerabilities and Exposures (CVE) is a comprehensive list of publicly disclosed information security vulnerabilities and exposures. It was launched in 1999 by the MITRE Corporation, a nonprofit organization that operates federally funded research and development centers in the United States.

What are the 4 main types of security vulnerability? ›

What are the 4 major types of security vulnerability?
  • Process (or procedural) vulnerabilities.
  • Operating system vulnerabilities.
  • Network vulnerabilities.
  • Human vulnerabilities.
Jan 12, 2024

What is the dictionary of Common Vulnerabilities and Exposures? ›

CVE is a dictionary of common names for publicly known cybersecurity vulnerabilities. CVE's common identifiers— called CVE Identifiers—make it easier to share data across separate network security databases and tools, and provide a baseline for evaluating the coverage of an organization's security tools.

What are the common vulnerabilities in cyber security? ›

Common cybersecurity vulnerabilities that cybercriminals can exploit include weak credentials, lack of data encryption, misconfigurations, out-of-date software and zero days. These vulnerabilities often lead to cyber attacks that bypass an organization's security measures and steal confidential data.

Top Articles
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 6136

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.