What are Common Vulnerabilities & Exposures (CVE)?
Overview
What is a CVE? Common Vulnerabilities and Exposures (CVE) is a free service that publicly lists known computer and network security vulnerabilities. CVE acts as a glossary that allows security and IT professionals within organizations to learn about common security flaws so they can better protect their systems. CVE also allows various security systems and tools to exchange information. The CVE list is maintained by non-profit MITRE Corporation, although vendors, researchers, developers, and users are also contributors. It’s worth noting the MITRE Corporation also advises federal agencies on scientific research, development, and cybersecurity protocols. CVE is also a component of the Security Content Automation Protocol (SCAP), a framework of specifications that supports automated security and vulnerability management. The National Institute of Standards and Technology (NIST) oversees the open standards that underlie SCAP and how they should be used. Read on to learn more about CVE, the framework behind this program, and the databases that keep the public informed about these issues.
Exposure vs. vulnerability
In information security, two key terms describe compromises within organizations’ IT systems. In CVE contexts, a vulnerability is a weakness within a software system. This weakness can create an opportunity for a threat actor to exploit, gain access, or otherwise interfere with the system. For example, some common security vulnerabilities include missing data encryption, broken algorithms, bugs, and uploading potentially risky file types. Exposure, on the other hand, is a step above vulnerability. Exposure occurs when a threat actor takes advantage of a vulnerability and performs unauthorized actions within a system. Essentially, an exposure is the logical outcome of a vulnerability.
CVE criteria
For an issue to qualify for the CVE list, it must meet all of the following criteria.
Vendor acknowledgment. The vendor managing the hardware or software must determine that the flaw negatively impacts network security or creates a potential cybersecurity threat.
Poses a risk. The vendor must be able to provide evidence that the flaw interferes with their security policies.
Acts independently of other issues. There must be a way to resolve the flaw independently of any other bugs or issues within a system.
Affects one codebase. The flaw must only affect one product. If more than one vulnerability or exposure affects a codebase, each of those issues receives a separate CVE identifier. The exception is if a shared protocol or standard cannot operate without being vulnerable. In this case, the flaw is assigned a single CVE identifier.
CVE databases
As of Dec. 16, 2022, there are a total of 202,178 CVEs listed in the National Vulnerability Database. Also as of this date, the NVD has received 23,972 new CVEs so far in 2022. Below are some databases that list CVEs.
National Vulnerability Database
The National Vulnerability Database (NVD) is the most comprehensive database of security vulnerabilities and information about them. Each of the vulnerabilities on the CVE list is included in the National Vulnerability Database. This database covers additional information about risks that the CVE does not contain. The NVD is fully synchronized with the CVE list, so any changes or additions are included in the larger database. It’s important to note CVSS scores are not included in the CVE list and are instead posted in the NVD.
Common Vulnerability Scoring System
The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing a vulnerability’s severity. The vulnerability will receive a numerical score based on the extent of its severity. The National Infrastructure Advisory Council launched the framework in 2005, and the coding system ranges from zero to 10. The below CVSS numbers mean the following.
0.1 to 3.9: Low threat
4.0 to 6.9: Medium threat
7.0 to 8.9: High threat
9.0 to 10.0: Critical threat
CVE identifiers
If a flaw qualifies as a CVE, it receives a CVE identifier. These labels follow the general format CVE-YEAR-NUMBER.
The first number in the CVE string represents the year the vulnerability was first identified.
Following identification, CVE Numbering Authorities (CNAs) assign a unique number to each CVE.
A CVE identified in 2006 that a CNA assigned the number 0794 would be labeled as CVE-2006-0794.