What is a CVE? (2024)

Published November 25, 2021

Overview

CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they meana security flaw that's been assigned aCVE ID number.

Security advisories issued by vendors and researchers almost always mention at least one CVE ID. CVEs help IT professionals coordinate their efforts to prioritize and address these vulnerabilities to make computer systems more secure.

How does the CVE system work?

The CVE program is overseen by the MITRE corporation with funding from the Cybersecurity and Infrastructure Security Agency (CISA), part of the U.S. Department of Homeland Security.

CVE entries are brief. They don’t include technical data, or information about risks, impacts, and fixes. Those details appear in other databases, including the U.S. National Vulnerability Database (NVD), the CERT/CC Vulnerability Notes Database, and various lists maintained by vendors and other organizations.

Across these different systems, CVE IDs give users a reliable way to recognize unique vulnerabilities and coordinate the development of security tools and solutions. The MITRE corporation maintains the CVE List, but a security flaw that becomes a CVE entry is often submitted by organizations and members of the open source community.

About CVE identifiers

CVE identifiers areassigned by a CVE Numbering Authority (CNA). There areabout 100 CNAs, representing major IT vendors—such as Red Hat, IBM, Cisco, Oracle, and Microsoft—as well as security companies and research organizations.MITRE can also issue CVEs directly.

CNAs are issued blocks of CVEs, which are held in reserve to attach to new issues asthey are discovered. Thousands of CVE IDs are issued every year. A single complex product, such as an operating system, can accumulate hundreds of CVEs.

CVE reports can come from anywhere. A vendor, a researcher, or just an astute user can discover a flaw and bring it to someone’s attention. Many vendors offerbug bounties to encourage responsible disclosure of security issues. If you find a vulnerability in open source software you should submit it to the community.

One way or another, information about the flaw makes its way to a CNA. The CNA assigns the information a CVE ID, and writes a brief description and includes references. Then the new CVE is posted on the CVE website.

Often, a CVE ID is assigned before a security advisoryis made public. It’s common for vendors to keep security flaws secret until a fix has been developed and tested. That reduces opportunities for attackers toexploitunpatched flaws.

Once made public, a CVE entry includes the CVE ID (in the format "CVE-2019-1234567"), a brief description of the security vulnerability or exposure, and references, which can include links to vulnerability reports and advisories.

What qualifies for a CVE?

CVE IDs are assigned to flaws that meet a specific set of criteria. They must be:

1. Independently fixable.

The flaw can be fixed independently of any other bugs.

2. Acknowledged by the affected vendor OR documented.

The software or hardware vendor acknowledges the bug and that it has a negative impact on security. Or, the reporter must have shared a vulnerability report that demonstrates the negative impact of the bug AND that it violates the security policy of the affected system.

3. Affecting one codebase.

Flaws that impact more than one product get separate CVEs. In cases of shared libraries, protocols or standards, the flaw gets a single CVE only if there’s no way to use the shared code without being vulnerable. Otherwise each affected codebase or product gets a unique CVE.

Stay informed about Red Hat security.

What is the Common Vulnerability Scoring System?

There are multiple ways to evaluate the severity of a vulnerability. One is the Common Vulnerability Scoring System (CVSS), a set of open standards for assigning a number to a vulnerability to assess its severity. CVSS scores are used by the NVD, CERT and others to assess the impact of vulnerabilities. Scores range from 0.0 to 10.0, with higher numbers representing a higher degree of severity of the vulnerability. Many security vendors have created their own scoring systems, as well.

Three key takeaways

Know your deployments. Just because a CVE exists doesn’t mean the risk applies to your specific environment and deployment. Be sure to read each CVE and understand if it applies to your environment by validating that it applies (or partially applies) to the operating system, application, modules, and configurations of your unique environment.

Practice vulnerability management.Vulnerability management is a repeatable process to identify, classify, prioritize, remediate, and mitigate vulnerabilities. This means understanding how a risk would apply to your organization so you can properly prioritize any outstanding vulnerabilities thatneed to be addressed.

Be ready to communicate. CVEs will impact your organization’s systems, both because of the vulnerabilities themselves and any potential downtime required to address them. Communicate and coordinate with your internal customers and share the vulnerabilities with any central risk management function within your organization.

How Red Hat works with CVEs

As a major contributor to open source software, Red Hat is continuously engaged in the security community. Red Hat is aCVE Numbering Authority (CNA) and uses CVE IDs to track security vulnerabilities. Red Hat Security maintains an open and frequently updated database of security updates, which you can view by CVE number.

What is the Red Hat Security Data API?

Red Hat Product Security provides access to raw security data on its Security Data page and in a machine-consumable format with the Security Data API.

In addition to the security reports and metrics which Red Hat produces, customers can use this raw data to produce their own metrics for their own unique situations.

The data provided by the Security Data API includes OVAL (Open Vulnerability and Assessment Language) definitions, Common Vulnerability Reporting Framework (CVRF) documents, and CVE data. Data is available in XML or JSON format.

Learn about Red Hat’s approach to security and compliance

What is a CVE? (2024)

FAQs

What does CVE stand for? ›

CVE stands for Common Vulnerabilities and Exposures. CVE is a glossary that classifies vulnerabilities. The glossary analyzes vulnerabilities and then uses the Common Vulnerability Scoring System (CVSS) to evaluate the threat level of a vulnerability.

What are examples of CVE? ›

Examples of software weaknesses that might lead to the introduction of vulnerabilities include the following:
  • Buffer overflows.
  • Manipulations of common special elements.
  • Channel and path errors.
  • Handler errors.
  • User interface errors.
  • Authentication errors.
  • Code evaluation and injection.

Why is CVE important? ›

CVE plays a significant role in security management by providing a standardized way to identify and track vulnerabilities across different platforms and software applications. It acts as a dictionary of vulnerabilities, assigning unique identifiers to each known vulnerability.

Does every vulnerability have a CVE? ›

Does the CVE Database List All Known Vulnerabilities and Exposures? CVE does not list all known vulnerabilities and exposures. The goal of CVE is to be comprehensive and it is.

Who keeps track of CVE? ›

The CVE Assignment and Vetting Process

CVE IDs are assigned by the CVE Assignment Team and CNAs. The diversity of CNAs provides varied yet specific areas of expertise for different types of vulnerabilities. Each CNA is able to reserve a CVE ID when the need arises.

Who assigns CVE? ›

CVE identifiers

CVEs are assigned by a CVE Numbering Authority (CNA). While some vendors acted as a CNA before, the name and designation was not created until February 1, 2005. There are three primary types of CVE number assignments: The Mitre Corporation functions as Editor and Primary CNA.

What is the most famous CVE? ›

1. Heartbleed (CVE-2014-0160) Heartbleed (CVE-2014-0160) is a security bug in the OpenSSL cryptography library, which is widely used to secure communications on the Internet.

Do hackers use CVE? ›

They scour the CVE's details to identify vulnerabilities that can be exploited in target systems, then develop or adapt exploit tools to take advantage of these weaknesses. Then they actively search for systems that have not yet applied patches or mitigations — making them easy targets for intrusion.

When would you use CVE? ›

By using the CVE ID for a particular vulnerability or exposure, organizations can quickly and accurately obtain information about it from a variety of information sources and coordinate their efforts to prioritize and address these vulnerabilities to their organizations more secure.

Why do we need CVE? ›

CVEs help in the timely dissemination of information about security vulnerabilities. This is crucial for open source projects to promptly release patches or updates, allowing users to mitigate risks and secure their systems.

Who would dispute a CVE and why? ›

In this case, the technology vendor, maintainer, or third party may dispute the CVE Record. It's unclear why a record would be allowed with incomplete information in the first place, since that seems to defeat the purpose of having a record, since they are supposed to provide a unique identifier for a vulnerability.

Who runs CVE? ›

CVE and NVD are two separate programs. The CVE List was launched by the MITRE Corporation as a community effort in 1999. The U.S. National Vulnerability Database (NVD) was launched by the National Institute of Standards and Technology (NIST) in 2005.

What is the tool to find CVE? ›

CVEMap is an open-source command-line interface (CLI) tool that allows you to explore Common Vulnerabilities and Exposures (CVEs). It's designed to offer a streamlined and user-friendly interface for navigating vulnerability databases.

What is the main purpose of the CVE list? ›

The mission of the CVE ® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog.

What is a CVE threat? ›

Common Vulnerabilities and Exposures (CVEs) are security threats that are included in a list or reference system of known risks. The CVE threat list is maintained by the MITRE Corporation, a nonprofit organization that runs U.S. federal government-sponsored research and development centers.

What does CVE mean in business? ›

Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues.

What does CVE mean exercise? ›

Cardiovascular endurance is a measure of how well you can do exercises that involve your whole body at moderate to high intensity for an extended time. Improving your cardiovascular endurance can make it easier for you to carry out your daily tasks.

What does CVE stand for in military terms? ›

1. Ships
ADDestroyer tender
CLLight cruiser
CLAAAntiaircraft light cruiser
CVAircraft carrier
CVEEscort aircraft carrier (merchant ship hull)
49 more rows
May 28, 2015

What does CVE stand for in healthcare? ›

Cardiovascular Event (CVE) Risk Study.

Top Articles
What goes well with celery?
What Is A Tomato Juice Substitute?
Drury Inn & Suites Bowling Green
417-990-0201
Katie Pavlich Bikini Photos
Botw Royal Guard
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Fnv Turbo
Nm Remote Access
Cranberry sauce, canned, sweetened, 1 slice (1/2" thick, approx 8 slices per can) - Health Encyclopedia
Brenna Percy Reddit
Craiglist Galveston
Dit is hoe de 130 nieuwe dubbele -deckers -treinen voor het land eruit zien
Jesus Calling Oct 27
Costco Gas Foster City
Michigan cannot fire coach Sherrone Moore for cause for known NCAA violations in sign-stealing case
Skyward Login Jennings County
Voy Boards Miss America
Red Devil 9664D Snowblower Manual
Account Suspended
Ahrefs Koopje
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Puss In Boots: The Last Wish Showtimes Near Cinépolis Vista
Cornedbeefapproved
Cor Triatriatum: Background, Pathophysiology, Epidemiology
Section 408 Allegiant Stadium
Tracking every 2024 Trade Deadline deal
25Cc To Tbsp
Devotion Showtimes Near The Grand 16 - Pier Park
Metra Schedule Ravinia To Chicago
Die Filmstarts-Kritik zu The Boogeyman
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Bianca Belair: Age, Husband, Height & More To Know
Me Tv Quizzes
Armageddon Time Showtimes Near Cmx Daytona 12
Restored Republic June 6 2023
Dispensaries Open On Christmas 2022
Gasoline Prices At Sam's Club
Brauche Hilfe bei AzBilliards - Billard-Aktuell.de
Comanche Or Crow Crossword Clue
Eat Like A King Who's On A Budget Copypasta
Candise Yang Acupuncture
Greg Steube Height
Tyco Forums
552 Bus Schedule To Atlantic City
Smoke From Street Outlaws Net Worth
Concentrix + Webhelp devient Concentrix
Cvs Minute Clinic Women's Services
Diamond Spikes Worth Aj
303-615-0055
Otter Bustr
Where To Find Mega Ring In Pokemon Radical Red
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5903

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.