Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures (CVE) is a publicly available catalog that identifies and lists known computer security flaws in software and hardware. Each vulnerability in the list receives a unique identifier (such as CVE-2024-12345), which makes it easier for security teams, vendors, and tools to refer to the same issue consistently. The CVE system helps organizations coordinate their responses to security threats by providing a shared reference point.
The CVE Program maintains a standardized dictionary of publicly disclosed information security vulnerabilities, where each entry is assigned a unique CVE ID that maps to a specific vulnerability in a defined code base or product version. The program's primary purpose is to uniquely identify vulnerabilities and associate them with specific versions of code, enabling interoperability across vulnerability databases, scanning tools, and advisory feeds. CVE Records in the current JSON 5.0 schema may include metadata such as CVSS scores embedded by CVE Numbering Authorities (CNAs), though enrichment depth varies by CNA. The defined lifecycle states for CVE entries are Reserved, Published, and Rejected. CVE serves as a foundational enumeration layer; additional analysis, severity scoring, and remediation guidance are typically provided by downstream consumers such as the National Vulnerability Database (NVD), vendor advisories, and commercial threat intelligence platforms.
Why it matters
Without a shared naming convention for security vulnerabilities, organizations, vendors, and security tools would each describe the same flaw in different ways, leading to confusion, duplicated effort, and gaps in remediation. The CVE system solves this coordination problem by assigning a unique, permanent identifier to each publicly disclosed vulnerability. This common language allows a vulnerability scanner's output, a vendor's security advisory, and an organization's internal patch-tracking ticket to reference the exact same issue unambiguously, which is essential for efficient and accurate vulnerability management at scale.
CVE identifiers also serve as the foundational enumeration layer that downstream systems depend on. The National Vulnerability Database (NVD), vendor advisories, and commercial threat intelligence platforms all consume CVE data to add severity scoring, affected-product mappings, and remediation guidance. If a vulnerability lacks a CVE ID, it may be invisible to automated scanning pipelines and patch-management workflows, potentially leaving organizations exposed. For this reason, the assignment and timely publication of CVE IDs is a critical step in the broader vulnerability disclosure and response ecosystem.
The importance of CVE extends into regulatory and compliance contexts as well. Many security frameworks and contractual requirements reference CVE identifiers when defining expectations around vulnerability remediation timelines. Organizations that cannot map their asset inventories to known CVEs typically struggle to demonstrate due diligence during audits or incident investigations, making CVE literacy a practical necessity for security and engineering teams alike.
Who it's relevant to
Inside CVE
Common questions
Answers to the questions practitioners most commonly ask about CVE.