What Is CVE?
Common Vulnerabilities and Exposures (CVE) is a
list
or dictionary that provides common names for publicly known information
security vulnerabilities and exposures. Using a common name makes
it easier to share data across separate databases and tools that
until now were not easily integrated. This makes CVE the key to
information sharing. If a report from one of your security tools
incorporates
CVE names
,
you may then quickly and accurately access fix information in one
or more separate
CVE-compatible
databases to remediate the problem.
CVE is:
-
One
name
for
one vulnerability or exposure
-
One standardized description for each vulnerability or exposure
-
A
dictionary
rather than a database
-
How disparate databases and tools can "speak" the
same language
-
The way to interoperability and better security coverage
-
A basis for evaluation among tools and databases
-
Accessible for
review
or
download
from the Internet
-
Industry-endorsed via the
CVE Editorial
Board
Back to top
Why CVE?
Most information security tools include a database of security
vulnerabilities and exposures; however, there is significant variation
among them and no easy way to determine when different databases
are referring to the same problem. The consequences are potential
gaps in security coverage and no effective interoperability among
the disparate databases and tools. In addition, each tool vendor
currently uses different metrics to state the number of vulnerabilities
or exposures they detect, which means there is no standardized basis
for evaluation among the tools.
With a standard list of
vulnerabilities
and
exposures
such as CVE,
your databases and tools can "speak" to each other. And,
youll know exactly what each tool covers because CVE provides you
with a baseline for evaluating the coverage of your tools. This
means you can determine which tools are most effective and appropriate
for your organizations needs. In short, CVE-compatible tools and
databases will give you better coverage, easier interoperability,
and enhanced security.
CVE is also endorsed by leading representatives from the information
security community. CVEs content results from the collaborative
efforts of the CVE Editorial Board, which includes representatives
from numerous information security-related organizations.
Back to top
Who Is the CVE Editorial Board?
The
CVE Editorial Board
includes
members from numerous information security-related organizations
including commercial security tool vendors, members of academia,
research institutions, government agencies, and other prominent
security experts. Through open and collaborative discussions, the
Board identifies which vulnerabilities or exposures are included
in CVE, then determines the common name and description for each
entry.
The MITRE Corporation
created
the Editorial Board, moderates
Board
discussions
, and provides guidance throughout the process to
ensure that CVE serves the public interest. Archives of
Board
meetings
and discussions are available for review on the CVE
Web site. Other information security experts will be invited to
participate on the Board on an as-needed basis based upon recommendations
from Board members.
Back to top
What It Means to Be CVE-Compatible
"
CVE-Compatible
"
means that a tool, Web site, database, or other security product
or service uses CVE names in a manner that allows it to be cross-referenced
with other products that employ CVE names.
"CVE compatible" means:
-
CVE SEARCHABLE A user can search using a CVE name to find
related information.
-
CVE OUTPUT Information is presented that includes the related
CVE name(s).
-
MAPPING The repository owner has provided a mapping relative
to a specific version of CVE, and has made a good faith effort
to ensure accuracy of that mapping.
-
DOCUMENTATION The organization's standard documentation includes
a description of CVE, CVE compatibility, and the details of how
its customers can use the CVE-related functionality of its product
or service.
Different tools provide different coverage/cross-referencing
of CVE names (e.g., some tools might cover UNIX, while others cover
Windows NT). You will need to evaluate any
CVE-compatible
products and services
based upon your organization's specific
requirements. Visit the
CVE-Compatible
Products and Services
page for the most current information
regarding the types and availability of CVE-compatible products
and services.
How to List a Product/Service as CVE-Compatible
We encourage organizations to make their products and services
CVE-compatible. Any organization with a security product or service
that uses CVE names in a way that allows it to cross-link with
other products or services that use CVE names may request to register
as
CVE-compatible
.
To do so the organization will need to fulfill the conditions
listed in the "
CVE
Compatibility Process
," which includes two phases: (1)
the
Declaration
Phase
in which the organization declares its
intent
to
make its product(s) and/or service(s) CVE-compatible; and (2) the
Evaluation
Phase
, which requires the completion of a questionnaire that
specifically looks for the details of how the organization has
satisfied the "
Requirements
and Recommendations for CVE Compatibility
" document. An
organization must complete phase 1 before being eligible for phase
2. Organizations that successfully complete the second phase will
be included in a branding program that offers an official CVE-Compatible
Product/Service logo to indicate compatibility, among other benefits.
To begin the registration process, review the official
CVE
Compatibility Process
then send an email to
cve@mitre.org
with
your company name and contact information, the type of product, and
the name of the product or service.
Back to top
The CVE Naming Process
The process begins with the discovery of a potential security
vulnerability or exposure. The information is then assigned a
CVE
Name with "candidate" status
(also called a candidate,
candidate number, or CAN). The CVE Editorial Board discusses the
candidate and votes on whether or not it should become a
CVE
Name with "entry" status
(also called an official
CVE entry, "CVE number," "CVE-ID," or "CVE").
If the candidate is accepted, it is entered into CVE and is published
on the CVE Web site. Candidates can be searched on the site, but
the CVE and candidates lists are separate.
See the
CVE Naming
Process
for additional information.
Back to top
How To Speak CVE
Network Security Administrators/Policy and Decision Makers:
Adopt
CVE-compatible products/services or encourage your vendors to be
CVE-compatible to support your enterprise requirements.
Security Vendors/Vulnerability Database Managers/Service Providers:
Deliver
CVE-compatible tools, databases, or services to your customers
for better coverage, easier interoperability, and enhanced security
across the enterprise.
Software Vendors:
Incorporate the use and reservation of
CVE names into your vulnerability handling process so that your customers
can work with concise information and leverage the power of vulnerability
scanners to verify that updates and fixes have been applied.
Back to top
CVE and MITRE
The
MITRE Corporation
created the
CVE
Editorial Board
, manages and maintains the
CVE
List
and
candidates
with
assistance from the Board, conducts community outreach activities,
maintains the CVE Web site, manages the
CVE
compatibility
program, and provides neutral guidance throughout
the process to ensure that CVE serves the public interest. In
accordance with its mission,
MITRE
has
traditionally acted in the public interest. Its unique role allows
it to provide an objective perspective to this effort.
Back to top
CVE Sponsor
CVE is sponsored by
U.S. Department of Homeland
Security
. A list of past sponsors is available on the
Sponsors
page.
Back to top
Senior Advisory Council
The
Senior Advisory Council
was
established to ensure that the CVE Initiative, later expanded to include
MITRE's
Open Vulnerability and Assessment
Language (OVAL)
effort, receive the sponsorship—including funding
and guidance—required to maximize their effectiveness in supporting
government efforts to improve the nation’s ability to identify and
respond to vulnerabilities and information assurance attacks or issues.
See the
members
page
and
council charter
for
more detailed information.
Back to top
View "
Introduction to CVE,
The Key to Information Sharing
" brochure PDF
For more information, please email
cve@mitre.org
Page last updated:
Thursday, 02-Mar-2006 13:33:32 EST
|