Descubre los últimos artículos sobre ciberseguridad industrial, vulnerabilidades OT, análisis de dispositivos, investigaciones técnicas, 0‑days y noticias relevantes del sector. En el blog de HackRTU profundizamos en la seguridad de sistemas industriales, en la familia de estándares IEC 62443 y tendencias e investigación en el ámbito de la ciberseguridad industrial.
A CVE or Common Vulnerabilities and Exposure is a unique and standardised identifier assigned to a publicly known vulnerability in a system, software or device.
Its objective is to establish a common and universal language to identify vulnerabilities accurately, facilitating communication to interested parties such as researchers, manufacturers, CNA (CVE Numbering Authority), CSIRT (Computer Security Incident Response Teams), PSIRTS (Product Security Incident Response Teams) or anyone interested in knowing the CVE affecting their devices or systems.
¿WHO MANAGES THE CVE IDENTIFIERS?
It should be noted that the NVD (National Vulnerability Database) is the US national database where CVEs are stored. All vulnerabilities in the NVD have been assigned a CVE identifier.
The National Vulnerability Database (NVD) is managed by the US National Institute of Standards and Technology (NIST), which is part of the US Department of Commerce. On the other hand, the authorised actor to manage vulnerabilities in the CVE Programme is MITRE (as the root operator of the CVE Numbering Authority or CNA). MITRE is the central coordinator, but CVE creation is decentralised across the CNA ecosystem.
EUVD, SIMILARITIES AND DIFFERENCES WITH THE CVE
Since 13 May 2025, the European Commission published the European Vulnerability Database (EUVD) by the European Union Agency for Cybersecurity (ENISA) to boost digital security also based on the needs imposed by the NIS2 or also called Network and Information Systems Security Directive.
The EUVD is another unique identifier like the CVE, used for the coordination and identification of vulnerabilities. Although ENISA is the actor in charge of the management of vulnerabilities with EUVD identifier, this coordination is complemented by the national CSIRTs, the European Commission (The Directorate-General for Communications Networks, Content and Technology, also called DG CONNECT), manufacturers and authorised researchers.
It is worth noting that currently, the NVD database with the different CVE identifiers that make it up is much more complete and is considered the vulnerability database par excellence. ENISA wants to promote EUVDs, but they are not yet as mature as CVEs and not all CVE identifiers exist in EUVD format, which can be confusing, although its aim is to be the reference database for vulnerabilities in Europe. Unlike CVEs, EUVD identifiers are introducing new concepts such as EPSS (Exploit Prediction Scoring System) within the data provided by the identifier or correlations with SBOMs (Software Bill of Materials).
Also, in terms of updates and new concepts, the CISA (Cybersecurity and Infrastructure Security Agency) has created a repo to conduct vulnerabilities enrichment of the CVE. This repo is a project in which CISA published the CISA's enrichment of public CVE records through CISA's ADP (Authorized Data Publisher) container. It allows the different users the capability to assessing new and recent CVEs and adding key SSVC (Stakeholder-Specific Vulnerability Categorization) decision points including parameters like the KEV (Known Exploited Vulnerabilities).
The following table shows not only the differences between CVE and EUVD identifiers, but also the differences between the different databases and the regulatory implications of each one.
CVE IDENTIFIER STRUCTURE
Each CVE has a structured, simple format, but it contains all the necessary information to know in general terms the vulnerability's impact, its impact and usually some basic mitigations. As an example, the vulnerability CVE-2025-41360 discovered by one of our researchers will be used to explain the structure of CVEs.
COMPONENTS ACCOMPANYING A CVE
Although the CVE identifier itself is only a string, its publication includes several key attributes that allow it to be evaluated in depth and its criticality to be catalogued. These attributes are published by all CNA or entities in charge of CVE disclosure.
CVSS (Common Vulnerability Scoring System): The CVSS provides a quantitative score of the level of severity of the vulnerability. It is based on metrics such as attack vector, complexity, required privileges, impact on confidentiality, integrity and availability. Since the latest version, CVSS 4.0, there are a greater number of environment conditions that allow a more advanced vulnerability assessment and therefore a more accurate risk value. There are now specific calculators for OT environments, which we will look at specifically in the post on CVSS.
On the other hand, although not strictly necessary, the following attributes or standards are also often included to provide more information about the CVE.
And in the case of EUVDs, ENISA is also providing the following technical concept:
All these technical concepts accompanying the CVE make CVE identifiers more than just an identifier, but a key asset for vulnerability management and risk management of industrial companies.
In subsequent posts, it will be explained in a technical and practical way all the terms that accompany CVE identifiers based on vulnerabilities reported by our team and already published.
HACKRTU TEAM
DIRECCIÓN:
Edificio CEBT, ILDEFE
Calle Santos Ovejero 1
P01-02 HackRTU
24008
León (León)
© HackRTU
2025