죄송합니다. 이 페이지의 콘텐츠는 선택하신 언어로 제공되지 않습니다.

나의 IP:알 수 없음

·

내 상태: 알 수 없음

주요 내용으로 건너뛰기


The CVE database explained

Cybersecurity defense specialists need to agree on their terminology so they can collaborate to combat threats. We need to speak the same language. This is why we need the CVE database.

2019년 12월 12일

5분 소요

featured-cve-database

What is CVE?

CVE stands for Common Vulnerabilities and Exposures. This is a publicly available glossary of known computer security vulnerabilities and system flaws that can be used to hack devices, systems or programs. Each entry includes CVE details — a unique serial ID number, a brief description, and at least one public reference. They can be accessed through the CVE website.

CVE Numbering Authorities (CNA) are organizations that assign CVE IDs to vulnerabilities. There are about 100 CNAs that include IT corporations, research institutions, security organizations, etc. The whole process is overseen by a non-profit CNA called Mitre Corporation, which manages government-funded research and development centres. Mitre is sponsored by the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA).

Any entity can identify a CVE vulnerability, but it must report it to a CNA as only the latter can assign it a CVE identifier. After receiving a vulnerability report, a CNA evaluates it, assigns an ID number and lists it as a CVE. The list only includes solved security issues to prevent hackers from using it to find new loopholes to exploit.

After being listed, the National Vulnerability Database evaluates each CVE’s severity and assigns it a severity index — a CVE Severity Analysis or CVSS score. This indicates how severe a CVE is on a scale from 0 to 10. The evaluation considers the complexity of the attack, the solution difficulty, the systems affected, etc. You can access the list on the NVD’s website.

CVE entries can have different statuses:

  • Reserved means that the entry is being in use by a CNA, but its details are not yet in the system;
  • Disputed means that there is a dispute between the interested parties (for example a CNA and MITRE or within a CNA) as to whether an entry qualifies as a CVE;
  • Reject indicates that an entry was rejected or withdrawn. The reasons might be incorrect assignment or administrative issues. You should ignore such entries.

CNDs constantly update the CVE list as new vulnerabilities emerge daily. Even then, there probably still are unreported risks or ones that are included in other lists.

Why do we need CVE?

  • Organizations can identify relevant listed security flaws, learn about them, and strengthen their security systems accordingly;
  • It makes communication easier as you can simply refer to a problem by its ID number. It is also useful for other databases as they can use the same standardized terminology;
  • CVE IDs are widely used by companies, security organizations and databases when referring to cybersecurity-related products and services. By using a CVE identifier, you can find information about a certain vulnerability quicker and easier.

읽으신 내용이 마음에
드시나요?

NordVPN의 최신 스토리 및 공지 사항 확인하기

당사는 스팸 메일을 보내지 않으며 사용자는 언제든지 구독을 취소할 수 있습니다

다음의 언어에서도 사용 가능: English,Italiano,‪한국어‬.


author paulius 1 png

Paulius Ilevičius

Paulius Ilevičius is a technology and art enthusiast who is always eager to explore the most up-to-date issues in cybersec and internet freedom. He is always in search for new and unexplored angles to share with his readers.