Your AI Apps Don’t Pentest Themselves

See How Novee AI Red Teams Your LLMs

Your AI Apps Don’t Pentest Themselves

See How Novee AI Red Teams Your LLMs

GlossaryCVE (Common Vulnerabilities and Exposures)

CVE (Common Vulnerabilities and Exposures)

Explore Article +

Key Takeaways

  • CVE is a standardized system that assigns unique identifiers to publicly known security vulnerabilities
  • Each CVE has a unique number (like CVE-2024-1234) allowing security teams worldwide to reference and track specific vulnerabilities
  • The CVE system enables coordination between vendors, security researchers, and organizations responding to vulnerabilities
  • Vulnerability scanners check systems against CVE databases to identify known issues, but this approach misses zero-days and novel vulnerabilities
  • Organizations often prioritize CVE remediation based on CVSS scores, though this doesn’t account for actual exploitability in specific environments

What Is CVE?

Common Vulnerabilities and Exposures (CVE) is a standardized identifier system for publicly known security vulnerabilities. Each CVE consists of a unique number that allows security professionals, vendors, and organizations worldwide to discuss and track specific vulnerabilities using the same reference.

The format is CVE-YEAR-NUMBER, such as CVE-2024-1234 or CVE-2023-5678. When security researchers discover vulnerabilities, they request CVE assignments from authorized numbering authorities. Once assigned, that CVE becomes the universal reference for that specific vulnerability.

Why CVE Matters

Universal Reference System

Before CVE, different vendors and security teams used different names for the same vulnerabilities, creating confusion. CVE provides a common language for discussing security issues.

Tracking and Coordination

Organizations track which CVEs affect their systems, which have patches available, and which pose the highest risk. Security bulletins, advisories, and scanning tools all reference CVE identifiers.

Disclosure Coordination

The CVE system facilitates coordinated disclosure between researchers who discover vulnerabilities and vendors who need to develop patches. CVE assignments help manage this process.

Scanner Foundation

Vulnerability scanners maintain databases of CVEs, checking whether systems contain software versions affected by known vulnerabilities. This forms the backbone of traditional vulnerability management.

Limitations of CVE-Based Security

Only Known Vulnerabilities

CVE identifiers only exist for discovered, documented vulnerabilities. Scanners checking for CVEs miss zero-days and novel vulnerabilities by definition – they can’t scan for issues that haven’t been documented yet.

Time Lag

There’s often a gap between vulnerability discovery and CVE assignment. During this period, the vulnerability exists but lacks a CVE identifier, making it invisible to CVE-based scanners.

Doesn’t Validate Exploitability

A CVE indicates that a vulnerability exists in software, not whether it’s exploitable in your specific environment. Configuration, network architecture, and security controls might prevent exploitation even when vulnerable software is present.

False Sense of Security

Organizations achieving “zero CVEs” in scanning results might believe they’re secure, when in reality they’re just free of known, documented vulnerabilities. Novel issues and business logic flaws remain undetected.


FAQ

CVE numbers are assigned by CVE Numbering Authorities (CNAs) — a network of organizations authorized by MITRE Corporation, which manages the CVE program. CNAs include software vendors, researchers, and security organizations. When a vendor patches a vulnerability or a researcher discloses one, they work with a CNA to obtain a CVE identifier.

Publication timelines vary. Coordinated disclosure typically gives vendors 90 days to develop a patch before a CVE is published. Emergency disclosures can happen faster when active exploitation is observed. Some CVEs are reserved years before publication. The NVD (National Vulnerability Database) enriches CVEs with CVSS scores and additional detail, which can add further delay after initial CVE assignment.

No. CVEs only cover publicly disclosed vulnerabilities. Zero-day vulnerabilities known only to attackers have no CVE. Vulnerabilities in custom applications or internal systems typically don’t receive CVEs. Novel vulnerabilities discovered through security research may go through a disclosure process before receiving CVE assignment. Many security issues never result in CVEs because they’re not publicly reported or don’t meet CVE criteria.