Skip to content
Inovasense

CVE

CVE (Common Vulnerabilities and Exposures) — Global standard for identifying cybersecurity vulnerabilities, each assigned a unique CVE-ID for tracking and patching.

CVE — Common Vulnerabilities and Exposures

CVE (Common Vulnerabilities and Exposures) is a globally recognized system for identifying and naming cybersecurity vulnerabilities. Each vulnerability receives a unique CVE-ID (e.g., CVE-2024-3094) that allows security teams, manufacturers, and regulators to unambiguously reference the same vulnerability. Under the EU Cyber Resilience Act, CVE monitoring is essential for meeting the 24-hour vulnerability reporting obligation to ENISA.

Key Facts

DetailInformation
Full nameCommon Vulnerabilities and Exposures
Maintained byMITRE Corporation (U.S., funded by CISA)
ID formatCVE-YYYY-NNNNN (year + sequential number)
Total CVEs published~240,000+ (as of early 2026)
New CVEs per year~25,000–30,000 (accelerating)
Public databasecve.org
Enrichment databaseNVD (National Vulnerability Database) — adds CVSS scores, CPE matches
EU equivalentENISA maintains EU Vulnerability Database (mandated by NIS2)

How CVEs Work

Lifecycle of a Vulnerability

┌────────────────────────────────────────────────────┐
│  1. DISCOVERY                                       │
│  Researcher / vendor / attacker finds vulnerability │
└──────────────────┬─────────────────────────────────┘

┌────────────────────────────────────────────────────┐
│  2. CVE ASSIGNMENT                                  │
│  CNA (CVE Numbering Authority) assigns CVE-ID       │
│  Reserved but not yet public                         │
└──────────────────┬─────────────────────────────────┘

┌────────────────────────────────────────────────────┐
│  3. PUBLICATION                                     │
│  CVE record published on cve.org                    │
│  Includes: description, references, affected products│
└──────────────────┬─────────────────────────────────┘

┌────────────────────────────────────────────────────┐
│  4. NVD ENRICHMENT                                  │
│  NVD adds: CVSS score, CPE matches, CWE category   │
│  Appears in automated scanning tools                 │
└──────────────────┬─────────────────────────────────┘

┌────────────────────────────────────────────────────┐
│  5. REMEDIATION                                     │
│  Vendor releases patch / firmware update via OTA    │
│  Product SBOM updated to reflect fixed versions     │
└─────────────────────────────────────────────────────┘

CVSS Severity Scoring

Each CVE receives a CVSS (Common Vulnerability Scoring System) score indicating severity:

CVSS ScoreSeverityExample Impact
9.0–10.0CriticalRemote code execution, complete device takeover
7.0–8.9HighPrivilege escalation, authentication bypass
4.0–6.9MediumInformation disclosure, denial of service
0.1–3.9LowMinor information leak, theoretical exploit

Why CVEs Matter for Hardware Manufacturers

CRA Vulnerability Reporting

The CRA creates a direct link between CVE monitoring and legal obligations:

CRA RequirementCVE Connection
24-hour ENISA notificationTriggered when a CVE affecting your product is actively exploited
No known vulnerabilities at shipmentAll CVEs matching your SBOM components must be patched before market placement
5-year vulnerability managementCVE monitoring must continue for the product’s entire support lifetime
OTA updatesCVE-triggered patches must be delivered to deployed devices

The SBOM–CVE Connection

Your product’s SBOM is the key to automated CVE monitoring:

SBOM ComponentCVE Risk Example
FreeRTOS 10.4.3CVE-2021-31571 — buffer overflow in TCP/IP stack
mbedTLS 2.28.0CVE-2023-43615 — certificate validation bypass
lwIP 2.1.3CVE-2023-36321 — denial of service via malformed packet
U-Boot 2023.04CVE-2024-xxxxx — secure boot bypass via crafted image
Linux kernel 5.15Hundreds of CVEs per year — continuous monitoring essential

The automated pipeline: SBOM → CPE matching → CVE database lookup → severity filtering → ENISA report generation → OTA patch deployment. This is what our SBOM Monitoring Service provides.

CVE Monitoring for Embedded Products

Challenges Specific to Embedded/IoT

ChallengeDescription
Long deployment cyclesIoT devices deployed for 10–15 years; CVEs accumulate over time
Constrained resourcesDevices may lack bandwidth/storage for frequent patches
Component lagEmbedded vendors often use older versions of open-source components
Custom BSPBoard Support Packages from silicon vendors may contain untracked components
Nested dependenciesTransitive dependencies (deps of deps) are often not in the SBOM
No centralized updaterUnlike mobile OS, each manufacturer manages their own update pipeline
  1. Generate SBOM at build time (SPDX or CycloneDX format).
  2. Map components to CPE identifiers for NVD database matching.
  3. Continuous CVE scanning — automated daily or real-time checks against NVD/EPSS feeds.
  4. Risk-based triage — prioritize by CVSS score × EPSS (Exploit Prediction Scoring System) × product exposure.
  5. Patch or mitigate — deliver fixes via OTA update or publish mitigation guidance.
  6. Report to ENISA — if actively exploited, trigger 24h/72h/14d reporting workflow.
  • SBOM — The component inventory that enables automated CVE matching.
  • ENISA — The EU agency that receives vulnerability reports triggered by CVEs.
  • CRA — The regulation mandating CVE monitoring and vulnerability management.
  • OTA Update — The delivery mechanism for CVE-triggered security patches.