CISCO ANNOUNCES INTENT TO ACQUIRE KENNA SECURITY.  
Learn more.
Contact Us
Talk to an Expert
Request a demo

Learn the Difference Between CVE and CVSS, and What They Mean to You

May 27, 2021
Kenna Security

Share with Your Network

CVE (Common Vulnerabilities or Exposures) refers to a list of publicly disclosed cybersecurity weaknesses, organized by identification numbers with descriptions and published dates. Many organizations prioritize CVEs using CVSS (Common Vulnerability Scoring System), a basic scoring framework that rates each CVE based on perceived severity. Understanding the difference between these terms is helpful to comprehend how they relate to effective vulnerability management.

This blog explores the nature and limitations of CVEs and CVSS, along with the challenges they present for risk reduction.

What is a CVE?

Since 1999, MITRE has maintained a free and publicly available list of known vulnerabilities and cybersecurity issues known as the CVE (Common Vulnerabilities and Exploits) Program. While there has always been controversy about the benefits (or pitfalls) of publishing known vulnerabilities and exploits, having this information widely available and accessible helps organizations patch potentially disastrous vulnerabilities more efficiently than if left to their own efforts.

CVEs are often submitted by researchers, white hat hackers, and vendors. Each CVE is then chronicled and organized by identification numbers (CVE Identifiers), which in turn creates a searchable list. A CVE record contains a description of the vulnerability, one or more public references for additional information, and the date the CVE was published. 

MITRE acts as the primary CNA (CVE Numbering Authority) aggregating a high-level list of CVEs linking oto other key information such as risks, CVSS scoring, fixes, etc. Other CVE databases also help organizations develop patches for critical security vulnerabilities. Microsoft, for instance, is a prominent CNA. This only makes sense, based on the sheer volume of vulnerabilities discovered in Microsoft products.

What is CVSS?

Regardless of the size of their budget or even their Security and IT teams, enterprises in all industries typically only have the resources to patch one out of 10 CVEs detected within their infrastructures. This means they have no choice but to prioritize which vulnerabilities to patch.

As a way to rank CVEs, many look to CVSS (Common Vulnerability Scoring System). Measured on a scale of 1-10, CVSS scores are based on an open, standardized methodology that provides a quick and easy numeric indicator of the severity of a vulnerability. (Many organizations by default try to remediate all CVEs assigned a CVSS score of 7 or above.)

Since they’re published and maintained in the National Vulnerability Database (NVD) (another widely known and publicly available tool), CVSS scores often create the foundation for an organization’s vulnerability management strategy. In fact, many vulnerability scanners simply repackage CVSS scores as the basis for their vulnerability fix lists.

What are the limitations of CVE and CVSS?

CVEs and CVSS are useful, but their value is limited, particularly due to the dynamic nature of vulnerabilities and how they’re exploited—and the need for Security teams to weigh more information than is available in either CVE records or within the CVSS scoring system. 

CVE records, for instance, generally lack key information such as exploit codes, fixes, popular targets, known malware, remote code execution details, etc. To find those, Security personnel have to do some additional sleuthing. (CVE records do often link to vendor sites and other resources, and these may in turn include links to patches and remediation advice. But it’s a manual, hunt-and-peck process that can be overwhelming to Security teams facing a list of hundreds, even thousands of so-called critical vulnerabilities.)

Another drawback to CVE is it represents vulnerabilities in unpatched software only. Organizations with a traditional approach to vulnerability management have long focused on unpatched software, trusting patched software to be accounted for and “safe.” This limited understanding ignores crucial attack vectors in a network or system

CVSS scores have their own limitations. First, CVSS is a static scoring method. Most CVEs receive a CVSS score within a few weeks of discovery and before any exploits are written against them. They’re scored based on the initial assessment of their potential to be exploited, and then rarely—if ever—updated.

CVSS scores also lack context, failing to factor in the prevalence of the vulnerability in actual network environments, the volume of exploits targeting that vulnerability, or other contextual information required for a security analyst to truly understand the level of risk a CVE poses to their unique environment. 

In fact, when it comes to preventing a breach by remediating the vulnerabilities most likely to be weaponized against a specific enterprise, a vulnerability score on its own is useless.

Why CVSS isn’t good enough to prevent a breach

Because of these shortcomings, CVSS scores are not equipped to provide insight into the relative criticality of each vulnerability within a specific enterprise environment. When remediation teams base their patch strategy on CVSS scores alone, they end up wasting limited time and strapped resources remediating potentially low-risk vulns. Not only can this increase tensions between Security teams tasking fix lists to IT teams and it doesn’t do much to reduce overall cybersecurity risk. 

Research shows that 2% to 5% of your vulnerabilities will be exploited, but CVSS can assign as many as 40% of all CVEs a score of 7 or higher. 

Leading analyst firms have emphasized the need for risk-based vulnerability management. Advanced risk-based vulnerability management (RBVM) is a data-driven approach to vulnerability prioritization based on threat and vulnerability intel pulled from the wild, data science, predictive analytics, and your organization’s acceptable level of risk. By focusing on the riskiest vulnerabilities, teams can better target their time and efforts. 

The most advanced vulnerability management programs automate previously manual tasks and turn intel into insight for more effective vulnerability management prioritization. As a result, organizations cut costs, make more efficient use of their limited resources, and do a better job reducing risk.

Learn more about how relying on CVE and CVSS alone won’t help you prevent a breach.

 

Share with Your Network

Read the Latest Content

Risk-Based Vulnerability Management

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management (RBVM) is a cybersecurity strategy in which organizations prioritize remediation of software vulnerabilities according to the risk they pose to the organization. A risk-based vulnerability management strategy has several components. They use threat intelligence to identify the vulnerabilities attackers are discussing, experimenting with, or using. Risk-based vulnerability management programs use this intelligence…

READ MORE
Vulnerability Management

What is Vulnerability Management?

Vulnerability management is a cybersecurity process of proactively identifying, tracking, prioritizing, and remediating security weaknesses and flaws in IT systems and software in order to prevent malware outbreaks, data theft, and other impacts of a cyber breach such as reputation or brand damage. Why Is Vulnerability Management  So Important?   At an enterprise IT level,…

READ MORE
Data Science

Ask Us About Our Data Science

What’s in a buzzword, like data science? A lot of resentment, for sure, but also a chance to explain.  A buzzword is a word or phrase, new or already existing, that becomes very popular for a period of time. Buzzwords often derive from technical terms. Yet through fashionable use, the original technical meaning disappears, and…

READ MORE
Sign up to get the latest updates
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.