CVE — Common Vulnerabilities and Exposures
CVE (Common Vulnerabilities and Exposures) is a globally recognized system for identifying and naming cybersecurity vulnerabilities. Each vulnerability receives a unique CVE-ID (e.g., CVE-2024-3094) that allows security teams, manufacturers, and regulators to unambiguously reference the same vulnerability. Under the EU Cyber Resilience Act, CVE monitoring is essential for meeting the 24-hour vulnerability reporting obligation to ENISA.
Key Facts
| Detail | Information |
|---|---|
| Full name | Common Vulnerabilities and Exposures |
| Maintained by | MITRE Corporation (U.S., funded by CISA) |
| ID format | CVE-YYYY-NNNNN (year + sequential number) |
| Total CVEs published | ~240,000+ (as of early 2026) |
| New CVEs per year | ~25,000—30,000 (accelerating) |
| Public database | cve.org |
| Enrichment database | NVD (National Vulnerability Database) — adds CVSS scores, CPE matches |
| EU equivalent | ENISA maintains EU Vulnerability Database (mandated by NIS2) |
How CVEs Work
Lifecycle of a Vulnerability
+----------------------------------------------------+
— 1. DISCOVERY —
— Researcher / vendor / attacker finds vulnerability —
+----------------------------------------------------+
?
+----------------------------------------------------+
— 2. CVE ASSIGNMENT —
— CNA (CVE Numbering Authority) assigns CVE-ID —
— Reserved but not yet public —
+----------------------------------------------------+
?
+----------------------------------------------------+
— 3. PUBLICATION —
— CVE record published on cve.org —
— Includes: description, references, affected products—
+----------------------------------------------------+
?
+----------------------------------------------------+
— 4. NVD ENRICHMENT —
— NVD adds: CVSS score, CPE matches, CWE category —
— Appears in automated scanning tools —
+----------------------------------------------------+
?
+----------------------------------------------------+
— 5. REMEDIATION —
— Vendor releases patch / firmware update via OTA —
— Product SBOM updated to reflect fixed versions —
+-----------------------------------------------------+
CVSS Severity Scoring
Each CVE receives a CVSS (Common Vulnerability Scoring System) score indicating severity:
| CVSS Score | Severity | Example Impact |
|---|---|---|
| 9.0—10.0 | Critical | Remote code execution, complete device takeover |
| 7.0—8.9 | High | Privilege escalation, authentication bypass |
| 4.0—6.9 | Medium | Information disclosure, denial of service |
| 0.1—3.9 | Low | Minor information leak, theoretical exploit |
Why CVEs Matter for Hardware Manufacturers
CRA Vulnerability Reporting
The CRA creates a direct link between CVE monitoring and legal obligations:
| CRA Requirement | CVE Connection |
|---|---|
| 24-hour ENISA notification | Triggered when a CVE affecting your product is actively exploited |
| No known vulnerabilities at shipment | All CVEs matching your SBOM components must be patched before market placement |
| 5-year vulnerability management | CVE monitoring must continue for the product’s entire support lifetime |
| OTA updates | CVE-triggered patches must be delivered to deployed devices |
The SBOM—CVE Connection
Your product’s SBOM is the key to automated CVE monitoring:
| SBOM Component | CVE Risk Example |
|---|---|
| FreeRTOS 10.4.3 | CVE-2021-31571 — buffer overflow in TCP/IP stack |
| mbedTLS 2.28.0 | CVE-2023-43615 — certificate validation bypass |
| lwIP 2.1.3 | CVE-2023-36321 — denial of service via malformed packet |
| U-Boot 2023.04 | CVE-2024-xxxxx — secure boot bypass via crafted image |
| Linux kernel 5.15 | Hundreds of CVEs per year — continuous monitoring essential |
The automated pipeline: SBOM ? CPE matching ? CVE database lookup ? severity filtering ? ENISA report generation ? OTA patch deployment. This is what our SBOM Monitoring Service provides.
CVE Monitoring for Embedded Products
Challenges Specific to Embedded/IoT
| Challenge | Description |
|---|---|
| Long deployment cycles | IoT devices deployed for 10—15 years; CVEs accumulate over time |
| Constrained resources | Devices may lack bandwidth/storage for frequent patches |
| Component lag | Embedded vendors often use older versions of open-source components |
| Custom BSP | Board Support Packages from silicon vendors may contain untracked components |
| Nested dependencies | Transitive dependencies (deps of deps) are often not in the SBOM |
| No centralized updater | Unlike mobile OS, each manufacturer manages their own update pipeline |
Recommended Monitoring Workflow
- Generate SBOM at build time (SPDX or CycloneDX format).
- Map components to CPE identifiers for NVD database matching.
- Continuous CVE scanning — automated daily or real-time checks against NVD/EPSS feeds.
- Risk-based triage — prioritize by CVSS score — EPSS (Exploit Prediction Scoring System) — product exposure.
- Patch or mitigate — deliver fixes via OTA update or publish mitigation guidance.
- Report to ENISA — if actively exploited, trigger 24h/72h/14d reporting workflow.
Related Terms
- SBOM — The component inventory that enables automated CVE matching.
- ENISA — The EU agency that receives vulnerability reports triggered by CVEs.
- CRA — The regulation mandating CVE monitoring and vulnerability management.
- OTA Update — The delivery mechanism for CVE-triggered security patches.
Official References
- CVE Program — MITRE Corporation — MITRE (CVE database and numbering authority)
- National Vulnerability Database (NVD) — NIST (enriched CVE data with CVSS scores)