CVE Detection
CVE Detection: What It Is, How It Works, and Why Every Unpatched System Is a Countdown Clock
What Is a CVE?
CVE stands for Common Vulnerabilities and Exposures. A CVE is a standardized identifier assigned to a publicly known security vulnerability in software or hardware. The CVE system was created by MITRE Corporation in 1999 to give security professionals a common language for discussing and addressing vulnerabilities.
Each CVE entry includes a unique identifier (for example, CVE-2024-12345), a description of the vulnerability, and references to advisories and patches. The National Vulnerability Database (NVD), maintained by NIST, enriches CVE entries with severity scores based on the Common Vulnerability Scoring System (CVSS). These scores range from 0 to 10, with scores above 9.0 classified as Critical.
CVE detection is the practice of scanning your environment to identify which of these published vulnerabilities exist in your systems and infrastructure, then helping you understand which ones pose the greatest risk given your specific context.
CVSS Severity Ratings
The Common Vulnerability Scoring System provides a numerical score that reflects the severity of a vulnerability. Understanding these ratings helps your team prioritize remediation.
Critical (9.0 to 10.0): Vulnerabilities in this range are easily exploitable and can lead to complete system compromise, often without authentication. These require immediate attention.
High (7.0 to 8.9): Significant vulnerabilities that are exploitable under common conditions. Remediation should be prioritized within days of discovery.
Medium (4.0 to 6.9): Vulnerabilities that may be exploitable under specific conditions. These should be addressed in your regular patching cycle.
Low (0.1 to 3.9): Vulnerabilities with limited exploitability or impact. These can typically be addressed in scheduled maintenance windows.
None (0.0): No vulnerability, used when a CVE is disputed or found to have no security impact.
CVSS scores provide a useful starting point, but your context matters. A medium-severity CVE in software that processes financial data may be higher priority for your organization than a high-severity CVE in a rarely used system.
Types of CVE Detection Tools
CVE Detection vs. Vulnerability Management
CVE detection is one component of a broader vulnerability management program. Detection tells you what vulnerabilities exist. Vulnerability management encompasses the full lifecycle: discovery, assessment, prioritization, remediation, and verification.
Detection without management creates a growing backlog of unaddressed findings. Effective programs use CVE detection as the input for a structured process that assigns ownership, sets remediation timelines based on severity, tracks progress, and verifies that patches were applied correctly.
CVE Detection Best Practices
Maintain a complete and current asset inventory. Vulnerability scanning can only cover what it can see. Untracked systems are a blind spot that attackers may find before you do.
Scan continuously rather than on a fixed schedule. New CVEs are published daily. Continuous scanning dramatically reduces the time between a vulnerability being published and your team knowing about it.
Prioritize by exploitability, not just CVSS score. A vulnerability with an active exploit in the wild is more urgent than a higher-scoring one with no known exploitation. Integrate threat intelligence to make that distinction.
Establish remediation SLAs by severity. Critical vulnerabilities might require patching within 24 to 48 hours. High might be one week. Medium might be part of your monthly patch cycle. Document these targets and track compliance.
Verify patches after deployment. Confirmation that a patch was deployed is not the same as confirmation that it was effective. Rescan affected systems after remediation to close the loop.
Include third-party software and open-source dependencies in your scanning scope. A significant share of vulnerabilities exist in components your developers didn’t write but your applications depend on.