Descubre los últimos artículos sobre ciberseguridad industrial, vulnerabilidades OT, análisis de dispositivos, investigaciones técnicas, 0‑days y noticias relevantes del sector. En el blog de HackRTU profundizamos en la seguridad de sistemas industriales, en la familia de estándares IEC 62443 y tendencias e investigación en el ámbito de la ciberseguridad industrial.
The VEX concept or Vulnerability Exploitability eXchange, refers to a standardised format used to transmit information about the possibility of exploiting a vulnerability in a specific product, whether software or hardware.
Broadly speaking, although we will look at this in detail throughout the article, it allows different actions to be prioritised, such as applying patches, mitigations or even scheduling maintenance windows more effectively.
The detection of a vulnerability (CVE) is complemented by the information provided by the VEX, as the Vulnerability Exploitability eXchange focuses on whether the vulnerability in a component can actually be exploited in a specific context, i.e., for an exact model and version.
Unlike EPSS, which predicts the probability of a CVE being exploited in the coming days, VEX provides a standardised format for declaring whether a CVE is exploitable in a specific product and why. The main objective of VEX is to complement the SBOM (Software Bill of Materials) and, as mentioned above, to assist in the prioritisation of actions, although VEX can also be independent of SBOM.
VULNERABILITY EXPLOITABILITY EXCHANGE
VEX was created with the aim of allowing software or hardware providers to declare the status of specific vulnerabilities in a given product.
On 27 September 2021, the US National Telecommunications and Information Administration (NTIA) published an informative technical document on the term VEX and its use with CSAF (Common Security Advisory Framework) as an OASIS standard. VEX has materialised as a profile within CSAF, which is a standard for the creation and sharing of security advisories in a structured manner, typically regarding vulnerabilities.
In 2022, the Cybersecurity and Infrastructure Security Agency (CISA) began promoting the use of VEX, and the first open source tools for its implementation and use appeared. Currently, VEX has been integrated into leading tools on the market.
In short, VEX enables the following features:
POSSIBLE STATES OF ACTION IN RELATION TO THE VEX
As VEX is an indicator of the status of a vulnerability for a specific component or product, hence its relationship with SBOMs, it allows these specific components or products to be classified into various statuses.
The combination of an SBOM and the vulnerability status of VEXs provides a powerful, up-to-date view of the security status of products.
OPENVEX, OPEN AND SIMPLIFIED IMPLEMENTATION OF VEX
Within VEX standardisation, there are open and simplified implementations such as OpenVEX (Open Vulnerability Exploitability eXchange), currently in its v.0.2.0 specification, which follows the minimum requirements for VEX established in coordination between the VEX Working Group and CISA.
Below is an example for the CVE-2025-64386 vulnerability discovered by our researchers in early 2025.
Now, with a basic understanding of vulnerability (more information about the CVE), the JSON-LD is displayed with the corresponding minimum fields:
|
{ "@context": "https://openvex.dev/context/v1", "schema_version": "0.2.0", "author": { "name": "HackRTU", "role": "Industrial Security Company" }, "timestamp": "2025-11-05T09:00:00Z", "document_id": "https://www.hackrtu.com/blog/cg-0day-003/", "statements": [ { "vulnerability": {"id": "CVE-2025-64386"}, "products": [ { "purl": "pkg:circutor/tcprs1plus@1.0.14", "type": "firmware", "cpe": "cpe:2.3:a:circutor:tcprs1plus:1.0.14:*:*:*:*:*:*:*" } ], "status": "affected" } ] } |
The global JSON Schema can be found in its official repository. It lists all the fields that can be defined within the OpenVEX implementation of VEX.

At HackRTU, we see the VEX standard as a possible accompaniment to SBOM, a way to simplify the process and help suppliers provide more information about the possibility of a vulnerability in an asset, software, or SBOM component being exploited. Likewise, there are other terms, standards, and concepts such as EPSS that can help determine the possibility of a vulnerability being exploited but do not provide a list in a language and format that can be automated for integration into security tools related to vulnerability management.
HACKRTU TEAM
DIRECCIÓN:
Edificio CEBT, ILDEFE
Calle Santos Ovejero 1
P01-02 HackRTU
24008
León (León)
© HackRTU
2025


