What is CVE?
CVE (Common Vulnerabilities and Exposures) is a public registry of known security vulnerabilities, each assigned a unique identifier used to track and communicate vulnerability information across tools and teams.
- 1.Definition
- 2.The Structure of a CVE Entry
- 3.How a CVE is Assigned
- 4.CVE vs. NVD vs. CVSS
- 5.Why CVE Identifiers Matter
Definition
CVE — Common Vulnerabilities and Exposures — is a publicly maintained catalog of known cybersecurity vulnerabilities. Each entry in the catalog is assigned a unique identifier (CVE-YEAR-NUMBER, e.g. CVE-2021-44228 for Log4Shell) that provides a common reference point for discussing, tracking, and remediating a specific vulnerability across tools, vendors, and teams.
CVE was created in 1999 by MITRE Corporation with funding from the US Department of Homeland Security. Today, the CVE Program involves hundreds of CVE Numbering Authorities (CNAs) — organizations authorized to assign CVE IDs to vulnerabilities in their products or scope — and covers hundreds of thousands of known vulnerabilities.
The Structure of a CVE Entry
Each CVE entry contains:
- CVE ID — a unique identifier in the format CVE-YEAR-NUMBER
- Description — a standardized description of the vulnerability
- References — links to advisories, patches, proof-of-concept code, and vendor responses
- Status — reserved, published, rejected, or disputed
- CVSS score — a severity score assigned by NVD (the National Vulnerability Database) based on the CVE
A CVE entry deliberately does not include: fix instructions, exploit code (in the CVE itself), or product-specific remediation guidance. Those details appear in vendor advisories and the NVD.
How a CVE is Assigned
- A researcher discovers a vulnerability and reports it to a CNA (the affected vendor, a coordinating CNA, or MITRE directly).
- The CNA assigns a CVE ID, often under embargo until a patch is available.
- The vulnerability is disclosed publicly, typically coordinated with the vendor's patch release.
- The CVE entry is published in the CVE database.
- NVD enriches the entry with CVSS score, CWE classification, and CPE affected product list.
CVE vs. NVD vs. CVSS
| System | What it provides | Maintained by |
|---|---|---|
| CVE | Unique identifiers and basic descriptions for known vulnerabilities | MITRE (CVE Program) |
| NVD | Enriched data: CVSS scores, CWE mapping, CPE affected products | NIST |
| CVSS | Severity scoring framework used to score CVE entries | FIRST (Forum of Incident Response and Security Teams) |
Why CVE Identifiers Matter
Without a common identifier, discussing and tracking vulnerabilities is ambiguous. Security tools, vendor patches, news articles, and vulnerability scanners all use CVE IDs as the reference. When a scanner reports CVE-2021-44228, every tool, team, and vendor knows exactly which vulnerability is being discussed — what it affects, what the severity is, and where to find patches.
CVE IDs are the lingua franca of vulnerability management. They enable:
- Scanner output to be linked to vendor advisories and patches
- SBOMs to be checked against known vulnerable versions
- Bug bounty and responsible disclosure workflows
- Regulatory reporting and audit trails
- Priority triage based on published CVSS scores
Limitations of CVE
The CVE program has known limitations:
- Coverage gaps — not all vulnerabilities receive CVE IDs, particularly in smaller or proprietary software
- Disclosure delay — some CVEs are published months or years after the underlying vulnerability was patched
- Description quality varies widely across CNAs
- The CVE backlog — NVD has historically struggled with the volume of new CVE entries requiring enrichment
CVE and Autonomous Code Governance
Hydra continuously monitors the CVE database and cross-references every dependency in a codebase against published CVE entries. When a new CVE is published affecting a dependency in use, Hydra generates an upgrade pull request — replacing the vulnerable version with the patched one — within hours of the CVE's NVD enrichment. This eliminates the lag between CVE publication and remediation that manual dependency management creates. For CVEs in the codebase's own code (not dependencies), Hydra's detection rules map to CWE classifications that cover the root causes of published CVEs.
Frequently Asked Questions
Who can assign a CVE ID?
CVE Numbering Authorities (CNAs). There are over 350 CNAs, including major software vendors (Microsoft, Google, Apple), security research organizations, bug bounty platforms, and coordinating CNAs. If a vulnerability falls outside any CNA's scope, it can be reported to MITRE directly for assignment.
What is the difference between a CVE and a security advisory?
A CVE entry is a minimal, standardized record: an ID, a description, and references. A security advisory is a vendor's detailed communication about a specific vulnerability — which products are affected, the severity, how to apply the patch, and workarounds. The CVE references the advisory; the advisory contains the actionable detail.
How long does it take for a vulnerability to get a CVE ID?
It varies widely. Coordinated disclosures (researcher contacts vendor, vendor patches, then both publish) typically result in a CVE at patch release — days to months. Vulnerabilities discovered in the wild may receive CVEs retroactively. Some vulnerabilities remain without CVE IDs for years, particularly in niche software or when no CNA covers the affected product.
Stop flagging. Start fixing.
Hyrax reviews your pull requests, remediates issues autonomously, and closes the ticket.
Join the waitlist