CVE explained: the global system for tracking security vulnerabilities

Approfondimenti chiave

  • CVE (Common Vulnerabilities and Exposures) is the global standard for identifying and cataloging publicly disclosed cybersecurity vulnerabilities, with over 308,000 entries since its 1999 launch and a record 48,185 new CVEs in 2025.
  • The CVE program survived a 2025 funding crisis when MITRE's contract nearly expired, but emerging alternatives like EUVD and GCVE signal a shift toward decentralized vulnerability tracking.
  • Only about 1% of published CVEs are confirmed exploited in the wild (2025), making risk-based prioritization with tools like the CISA KEV catalog essential for efficient patching.
  • The NVD enrichment backlog affects roughly 44% of recent CVEs (2025), forcing teams to supplement NVD data with CISA Vulnrichment, vendor advisories, and the new European EUVD.
  • Behavioral detection complements CVE-based patching by identifying exploitation patterns — like lateral movement and privilege escalation — regardless of whether a specific CVE has been assigned.

Every day, security teams face a flood of new software flaws — more than 130 disclosed every 24 hours in 2025 alone. Without a shared system for naming and tracking those flaws, defenders would waste critical hours just figuring out whether two advisories describe the same bug. That shared system is CVE, and understanding how it works is foundational to every modern vulnerability management program. This guide covers what CVE means, how identifiers are assigned, the ecosystem of related standards, and the 2025 funding crisis that nearly shut the entire program down. Whether you are triaging alerts in a SOC or mapping controls for an audit, the information here will sharpen how you use CVE data day to day.

What is CVE?

CVE (Common Vulnerabilities and Exposures) is a standardized identification system that assigns unique IDs to publicly disclosed cybersecurity vulnerabilities, giving security teams, vendors, and researchers a common language to track, discuss, and remediate specific flaws across tools and organizations worldwide.

The MITRE Corporation created the CVE system in 1999 with funding from the U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). Before CVE existed, a single vulnerability might carry different names in different scanners, advisories, and patch bulletins. That inconsistency made cross-team coordination slow and error-prone. CVE solved the problem by providing one canonical identifier per flaw — a reference number that every tool, every vendor, and every analyst can point to unambiguously.

The scale of the program reflects the scale of the problem. According to Jerry Gamblin's 2025 CVE Data Review, a record 48,185 CVEs were published in 2025 — a 20.6% increase over 2024's 39,962 entries. The cumulative catalog now exceeds 308,000 entries. That growth underscores both the expanding attack surface and the critical role CVE plays in keeping vulnerability data organized.

The CVE.org program overview describes the mission succinctly: identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. The system is free to use, openly accessible, and integrated into virtually every major security tool on the market.

Why CVE matters for security teams

Without CVE, organizations would lack a shared vocabulary for discussing specific vulnerabilities. When a scanner flags a flaw and a patch bulletin addresses the same flaw, the CVE ID is what confirms they are talking about the same issue. That shared reference enables several critical workflows:

  • Cross-tool correlation. SIEM platforms, vulnerability scanners, and patch management systems all index by CVE ID, allowing analysts to correlate findings without manual mapping.
  • Faster communication. Instead of describing a flaw in prose, a team can share a CVE ID and everyone — from the SOC analyst to the CISO — immediately knows the scope.
  • Compliance reporting. Frameworks like PCI DSS, NIST CSF, and NIS2 reference CVE-based tracking as a core control for vulnerability management.
  • Threat intelligence. Feeds from CISA, vendor advisories, and open-source intelligence all use CVE IDs as the primary key for vulnerability data.

How CVE identifiers are structured

A CVE identifier follows the format CVE-YEAR-NUMBER and includes a description, affected products, severity score, and reference links. Understanding the anatomy of a CVE ID helps analysts quickly parse advisories and prioritize action.

Each identifier has three components:

  1. CVE prefix. The literal string "CVE" that marks the entry as part of the program.
  2. Year. The four-digit year in which the CVE ID was assigned (not necessarily the year the flaw was discovered or disclosed).
  3. Sequential number. A unique numeric sequence. Since 2014, the program supports five or more digits to accommodate volume growth — a change driven by the steady rise in annual disclosures.

Beyond the ID itself, each CVE record contains several data fields:

  • Description. A concise explanation of the vulnerability, including affected software or component.
  • Affected products. Versions and configurations impacted.
  • References. Links to vendor advisories, patches, and technical write-ups.
  • CNA source. The CVE Numbering Authority that assigned the ID.

How to read a CVE entry

Consider CVE-2021-44228, commonly known as Log4Shell. The ID tells you immediately that it was assigned in 2021 and carries sequence number 44228. The CVE record describes a remote code execution flaw in the Apache Log4j 2 logging library. Its CVSS score — assigned separately through the Common Vulnerability Scoring System — is 10.0, the maximum severity. The references section links to the Apache advisory, the NVD enrichment page, and multiple third-party analyses.

It is important to distinguish the CVE ID itself from the CVSS score that accompanies it. CVE identifies what the flaw is. CVSS — maintained by the Forum of Incident Response and Security Teams (FIRST) — quantifies how severe that flaw is on a 0–10 scale. The two systems are complementary, not interchangeable.

How the CVE system works

CVE Numbering Authorities validate and assign identifiers through a structured lifecycle from discovery to publication and NVD enrichment. The process moves through six stages:

  1. Researcher discovers a vulnerability in software, hardware, or firmware.
  2. Report submitted to a CNA or directly to MITRE through the CVE.org request form.
  3. CNA validates the report and confirms the flaw meets CVE inclusion criteria.
  4. CNA assigns a CVE ID within its authorized scope.
  5. CVE record published on CVE.org with description and references.
  6. NVD enriches the record with CVSS score, Common Platform Enumeration (CPE) data, and additional metadata.

The CNA hierarchy is structured in three tiers. MITRE serves as the Top-Level Root, overseeing the entire program. Below MITRE sit Roots — organizations like CISA, Google, and Microsoft that manage groups of CNAs. At the base are the CVE Numbering Authorities themselves: 365 active CNAs operated across the ecosystem in 2025.

What is a CVE Numbering Authority?

A CVE Numbering Authority (CNA) is an organization authorized by the CVE program to assign CVE IDs within a defined scope — typically its own products or a specific technology domain. The top CNAs by volume in 2025 illustrate the breadth of the program:

  • Patchstack: 7,007 CVEs (WordPress ecosystem)
  • VulDB: 5,902 CVEs
  • Linux: 5,686 CVEs
  • MITRE: 5,208 CVEs
  • Wordfence: 3,451 CVEs

These numbers, drawn from Jerry Gamblin's 2025 analysis, show that open-source and web application ecosystems now drive the largest share of new CVE assignments. Any organization can apply to become a CNA through the CVE.org program.

How to report a vulnerability to CVE

Researchers who discover a flaw can report it through two paths. If the affected vendor operates as a CNA, the researcher submits directly to that vendor. If not, the researcher can use the CVE.org request form, which routes the submission to the appropriate CNA or to MITRE as a last resort.

Not every submission results in a published CVE. In 2025, 1,787 CVEs were rejected — a 3.58% rejection rate — typically because the reported issue did not meet the program's inclusion criteria or duplicated an existing entry.

The CVE ecosystem: CVE vs CVSS, CWE, and NVD

CVE identifies specific vulnerabilities, while CVSS scores their severity, CWE classifies weakness types, and NVD provides enriched metadata. These four systems are commonly confused, so a clear comparison helps practitioners understand how they fit together.

How CVE, CWE, CVSS, and NVD relate in the vulnerability management pipeline:

System Scopo Maintained by Esempio
CVE Unique identifier for a specific vulnerability MITRE Corporation CVE-2021-44228 (Log4Shell)
CWE Categorizes the type of underlying weakness MITRE Corporation CWE-79 (Cross-Site Scripting)
CVSS Severity score on a 0–10 scale FIRST 10.0 (Critical)
NVD Enriched database with CVSS scores, CPE data, and fix info NIST NVD entry for CVE-2021-44228

The pipeline works like this: a CWE describes the general weakness class (for example, CWE-79 for Cross-Site Scripting). A CVE identifies a specific instance of that weakness in a particular product. CVSS then scores how severe that specific instance is. Finally, the National Vulnerability Database enriches the CVE record with structured data — CVSS scores, affected product enumerations, and references to patches.

In 2025, CWE-79 (Cross-Site Scripting) led all weakness categories with 8,207 instances, and the average CVSS score across all published CVEs was 6.60 — squarely in the "Medium" severity range.

Understanding these distinctions matters because they answer different questions. "What is the flaw?" — that is CVE. "What kind of flaw is it?" — that is CWE. "How bad is it?" — that is CVSS. "Where can I find the complete enriched record?" — that is NVD.

Current state of the CVE program (2025–2026)

The CVE program survived a 2025 funding crisis, but NVD backlogs and competing systems like EUVD and GCVE are reshaping vulnerability tracking. This section covers the three developments that competitors in the SERP consistently miss.

The 2025 funding crisis and resolution

In April 2025, the CVE program came within days of shutting down. MITRE's contract with DHS to operate the program was set to expire, and no renewal was in place. SecurityWeek reported that MITRE leadership signaled "potential deterioration" of the program as the deadline approached.

On April 16, 2025, two things happened simultaneously. CISA secured an 11-month bridge extension to keep the program running. And the newly formed CVE Foundation — a nonprofit established by CVE Board members — launched to advocate for diversified, long-term governance.

By January 2026, the situation stabilized. CSO Online reported that the CVE Board was informed there would be "no funding cliff in March," with CVE elevated to a core CISA program. However, funding details remain opaque — described by observers as a "mystery contract with a mystery number."

EUVD and GCVE: emerging alternatives

The funding scare accelerated two alternative approaches to vulnerability tracking:

  • EUVD (European Union Vulnerability Database). Launched by ENISA in May 2025 under the NIS2 Directive, the EUVD provides an EU-operated vulnerability catalog. It complements CVE rather than replacing it, but gives European organizations a regional source of truth. The EU Cyber Resilience Act (CRA) will require vendors to report actively exploited vulnerabilities within 24 hours by September 2026.
  • GCVE (Global CVE). Launched by CIRCL in January 2026, GCVE takes a decentralized approach where multiple organizations can independently assign vulnerability identifiers using the GCVE.eu framework. While proponents see resilience benefits, Dark Reading noted fragmentation concerns from practitioners who worry about maintaining a single source of truth.

The NVD enrichment backlog

The National Vulnerability Database — the NIST-maintained system that enriches CVE records with CVSS scores and CPE data — has struggled to keep pace. According to analysis by inventivehq, approximately 44% of CVEs added in the past year lack CVSS scores and affected product data (2025).

NIST compounded the problem by marking all pre-2018 CVEs as "Deferred" — nearly 100,000 records that will no longer receive enrichment updates (2026). The Commerce Department's Office of Inspector General launched a federal audit into NVD management practices.

For practitioners, the implication is clear: teams relying solely on NVD face incomplete data. CISA's Vulnrichment project provides a supplementary enrichment source, and the EUVD offers an additional data stream for EU-regulated organizations.

CVE in practice: real-world exploitation patterns

With more than 130 new CVEs published daily and 28% of exploits launched within 24 hours of disclosure (2025), organizations need automated triage that goes beyond manual tracking.

The 2025 numbers paint a stark picture. Of the record 48,185 published CVEs, the severity breakdown was:

Severity Count Percentage
Critico 3,984 8.3%
Alto 15,003 31.1%
Medio 25,551 53.0%
Basso 1,557 3.2%

CVE severity distribution in 2025, based on CVSS scores. Source: Jerry Gamblin's 2025 CVE Data Review.

Despite the volume, threat actors remain highly selective. Only about 1% of the 48,000+ CVEs published in 2025 were confirmed exploited in the wild. However, when exploitation does occur, it happens fast — 54% of critical CVEs were exploited within the first week of disclosure (2025). Security researchers identified 884 known exploited vulnerabilities with first-time evidence in 2025, and the CISA KEV catalog grew by 244 entries (a 28% increase), bringing its total to 1,483.

FIRST projects a median of 59,427 new CVEs for 2026 — a trajectory that makes manual tracking increasingly untenable.

Notable CVE case studies

Three real-world examples illustrate different exploitation patterns:

  • Log4Shell (CVE-2021-44228). A critical remote code execution flaw in the Apache Log4j 2 library, scoring CVSS 10.0. Attackers began exploiting it within hours of disclosure in December 2021. Because Log4j is embedded in millions of applications, the blast radius was enormous — and organizations are still finding unpatched instances years later.
  • MOVEit Transfer (CVE-2023-34362). A SQL injection zero-day vulnerability in Progress Software's file transfer tool. The CL0P ransomware operation exploited it before a patch was available, compromising approximately 130 organizations across government, finance, and healthcare.
  • GoAnywhere MFT (CVE-2025-10035). Another file transfer tool targeted in a supply chain attack pattern. Medusa-affiliated actors exploited the flaw before public disclosure, executing a full attack chain from initial access through lateral movement, data exfiltration, and ransomware deployment.

Using CVE data to detect and prevent attacks

Effective CVE-based defense requires risk-based prioritization combining CVSS scores, CISA KEV status, exploit intelligence, and behavioral detection capabilities. The following workflow helps security teams operationalize CVE data:

  1. Monitor CVE sources. Track new disclosures from CVE.org, NVD, the CISA Known Exploited Vulnerabilities catalog, EUVD, and vendor-specific advisories.
  2. Correlate with your asset inventory. Map published CVEs against your environment using asset management and SBOM (Software Bill of Materials) data for third-party component visibility.
  3. Prioritize using a risk-based approach. Combine CVSS severity, CISA KEV status (is the CVE actively exploited?), available exploit intelligence, and asset criticality to rank remediation urgency.
  4. Remediate. Apply patches where available. Where patching is not immediately possible, deploy compensating controls — virtual patching, network segmentation, or access restrictions.
  5. Verify and track. Confirm that remediation was effective through rescanning and update your tracking systems.

The CISA KEV catalog deserves special attention in step three. With a median time to KEV inclusion of just 5.0 days (down from 8.5 in prior years, 2025), the catalog provides a fast, curated signal of which CVEs attackers are actually using. Under Binding Operational Directive 22-01, U.S. federal agencies must remediate KEV entries within mandated timelines.

Beyond CVE-based patching: behavioral detection

CVE-based patching alone leaves gaps. Zero-day vulnerabilities are exploited before any CVE ID exists. Patches take time to deploy. And some environments — legacy systems, operational technology, third-party SaaS — cannot be patched quickly.

Behavioral threat detection closes that gap by focusing on what attackers do after exploiting a vulnerability, rather than on the specific CVE they used. Network detection and response solutions monitor for post-exploitation behaviors — reconnaissance, lateral movement, privilege escalation, command-and-control communication, and data exfiltration — regardless of the entry vector.

A defense-in-depth approach combines CVE-based vulnerability management with behavioral detection and incident response capabilities. When a zero-day bypass renders CVE-based defenses temporarily blind, behavioral detection provides the safety net.

CVE and compliance

CVE tracking directly supports compliance requirements across major regulatory frameworks. The following crosswalk maps CVE processes to the controls that auditors look for.

How CVE tracking maps to major compliance frameworks:

Struttura Relevant control CVE requirement Prove
NIST CSF ID.RA-1, PR.IP-12 Identify asset vulnerabilities; maintain vulnerability management plan CVE-based scan reports, remediation logs
PCI DSS versione 4.0 Requirement 6.3 Identify and manage security vulnerabilities using CVE data Quarterly scan results with CVE mapping
ISO 27001:2022 Control A.12.6 Technical vulnerability management CVE tracking records, patch timelines
Direttiva NIS2 Articolo 21 Risk-based vulnerability management EUVD integration, CVE-based risk assessments
CISA BOD 22-01 Full directive Remediate KEV catalog entries within mandated timelines KEV compliance reports, remediation evidence

Beyond framework mapping, CVE data connects directly to the MITRE ATT&CK. MITRE's Center for Threat-Informed Defense (CTID) maintains a project mapping ATT&CK techniques to CVEs, linking specific vulnerabilities to attacker behaviors. For example, technique T1190 (Exploit Public-Facing Application) maps to CVEs in web servers and APIs, while T1068 (Exploitation for Privilege Escalation) maps to local elevation-of-privilege flaws.

Modern approaches to vulnerability intelligence

Modern vulnerability intelligence combines CVE data with behavioral detection and risk-based prioritization to address the gap between disclosure and exploitation. With FIRST projecting a median of 59,427 new CVEs for 2026, the old approach of patching everything by CVSS score is collapsing under its own weight.

Several shifts define the current landscape:

  • Risk-based prioritization over CVSS-only triage. Only 1% of CVEs are confirmed exploited in the wild (2025). The CISA KEV catalog, exploit intelligence feeds, and asset criticality data provide far better signal than raw severity scores alone.
  • Supplementary enrichment beyond NVD. With the NVD backlog affecting 44% of recent entries, teams are turning to CISA Vulnrichment, the EUVD, vendor advisories, and open-source intelligence to fill the gap.
  • SBOM for dependency tracking. Software Bills of Materials give organizations visibility into transitive dependencies — the third-party libraries buried deep in their applications — so they can quickly assess CVE exposure across their entire software supply chain.
  • Automation and AI-assisted triage. At 130+ new CVEs per day, manual review is untenable. Organizations are adopting automated correlation engines that match new CVEs against asset inventories and flag only the entries that pose real risk.
  • Behavioral detection as a complement. Continuous threat exposure management and vulnerability assessment programs increasingly pair CVE-based scanning with behavioral monitoring to catch exploitation of unknown or unpatched flaws.

How Vectra AI thinks about vulnerability exploitation

Vectra AI approaches vulnerability exploitation through the lens of assume compromise. Rather than relying solely on CVE-based patching, Vectra AI's Attack Signal Intelligence focuses on detecting the behaviors attackers exhibit after exploiting vulnerabilities — whether those CVEs are known, unknown, or zero-day. This methodology ensures defenders can identify exploitation patterns like lateral movement, privilege escalation, and data exfiltration regardless of the specific CVE involved, closing the gap between vulnerability disclosure and organizational response.

Tendenze future e considerazioni emergenti

The vulnerability disclosure ecosystem is entering a period of rapid structural change. Over the next 12–24 months, several developments will reshape how organizations discover, prioritize, and respond to CVEs.

Volume will continue to accelerate. FIRST's median projection of 59,427 new CVEs for 2026 represents another 23% increase over 2025's record. AI frameworks (Langflow, Semantic Kernel) and enterprise control planes (SD-WAN appliances, identity infrastructure, migration tools) are opening new vulnerability categories that barely existed two years ago. Security teams should plan staffing and tooling around the assumption that daily CVE volume will exceed 160 entries by late 2026.

Regulatory requirements will tighten. The EU Cyber Resilience Act (CRA) takes effect in September 2026, requiring vendors to report actively exploited vulnerabilities within 24 hours. NIS2 already mandates risk-based vulnerability management for essential and important entities across the EU. In the U.S., the Commerce Department's OIG audit of NVD could result in structural changes to how NIST enriches vulnerability data. Organizations operating in multiple jurisdictions should prepare for overlapping CVE, EUVD, and GCVE reporting obligations.

Decentralization will bring both resilience and friction. The emergence of EUVD and GCVE introduces redundancy — a valuable safeguard against single points of failure like the 2025 funding scare. But it also introduces coordination challenges. Will a vulnerability tracked in GCVE carry the same ID in CVE? How will NVD handle enrichment for entries that originate outside the traditional CNA hierarchy? These questions remain unanswered and will demand attention from both policy makers and practitioners.

AI-assisted CVE triage will become table stakes. With the NVD backlog persisting and volume rising, organizations that still rely on manual CVE review will fall further behind. Expect broader adoption of automated correlation engines, AI-driven exploitability prediction models, and integration of SBOM data into vulnerability management workflows.

Investment priority: Organizations should budget for automated CVE correlation, SBOM tooling, and behavioral detection capabilities that work independently of specific CVE assignments — because the next critical exploit may arrive before any CVE ID does.

Conclusione

CVE remains the bedrock of how the cybersecurity community identifies and communicates about vulnerabilities. From its 1999 origins to the record 48,185 entries published in 2025, the system has scaled alongside an ever-expanding attack surface. But scale brings challenges: the 2025 funding crisis, the NVD enrichment backlog, and the emergence of EUVD and GCVE all signal that the vulnerability ecosystem is diversifying.

For security teams, the practical takeaway is to build workflows that go beyond CVE alone. Pair CVE tracking with risk-based prioritization using the CISA KEV catalog, supplement NVD data with multiple enrichment sources, and invest in behavioral detection that catches exploitation regardless of whether a CVE has been assigned. The attackers who matter most — the ones targeting your organization — will not wait for a CVE ID before they strike.

To learn how Vectra AI helps organizations detect post-exploitation behaviors across network, identity, and cloud environments, explore the Vectra AI platform.

Domande frequenti

What does CVE stand for?

How are CVE identifiers assigned?

What is the difference between CVE and CVSS?

What is the difference between CVE and NVD?

How many CVEs have been published?

What happened to CVE funding in 2025?

What is the CISA KEV catalog?