Common Vulnerabilities and Exposures

What is a CVE ?

Introduction

If you’ve worked in cybersecurity or DevSecOps, you’ve probably seen terms like “CVE-2024-xxxx.” But what does CVE actually mean — and why does it matter?

Let’s break it down.


1. CVE = Common Vulnerabilities and Exposures

CVE stands for Common Vulnerabilities and Exposures. It’s a standardized way to identify and track publicly known security flaws in software or hardware.

Each CVE has a unique ID, like:

CVE-2023-12345

This ID lets security teams around the world talk about the same issue in a consistent way.


2. Who manages CVEs?

The CVE system is maintained by MITRE, a nonprofit that works with the U.S. government.
MITRE assigns CVE IDs and works with a global network of CVE Numbering Authorities (CNAs) — like Microsoft, Red Hat, or the Apache Foundation.


3. What’s in a CVE entry?

A CVE entry includes:

  • ID: e.g., CVE-2024-0001
  • Description: What the vulnerability is
  • References: Links to patches, advisories, exploit details
  • Severity: Often tied to a CVSS score (Common Vulnerability Scoring System)

But note: CVEs don’t include the fix — just the identifier and summary.


4. Why CVEs matter in DevSecOps

  • Enable automated vulnerability scanning (e.g. Snyk, Trivy)
  • Help prioritize risks by severity (CVSS score)
  • Keep dependency management secure
  • Allow SBOMs (Software Bill of Materials) to identify exposure

5. Real-World Example


CVE-2021-44228 (Log4Shell)

A critical vulnerability in Log4j that impacted millions of systems.
Thanks to the CVE system, security teams quickly identified and patched it.


Conclusion

CVEs are the universal language of vulnerabilities. They allow teams to track, discuss, and remediate security flaws efficiently and globally.
That’s what a CVE is.