Vulnerability Management

CVE and CVSS

TermDescription
CVECommon Vulnerabilities and Exposures โ€” unique ID (e.g., CVE-2021-44228)
CVSSCommon Vulnerability Scoring System โ€” 0.0โ€“10.0 severity score
NVDNational Vulnerability Database โ€” NIST repository of CVEs
CWECommon Weakness Enumeration โ€” root cause classification
EPSSExploit Prediction Scoring System โ€” probability of exploitation
KEVCISA Known Exploited Vulnerabilities โ€” actively exploited CVEs

CVSS v3.1 Score Breakdown

MetricOptions
Attack Vector (AV)Network (N), Adjacent (A), Local (L), Physical (P)
Attack Complexity (AC)Low (L), High (H)
Privileges Required (PR)None (N), Low (L), High (H)
User Interaction (UI)None (N), Required (R)
Scope (S)Unchanged (U), Changed (C)
Confidentiality (C)None (N), Low (L), High (H)
Integrity (I)None (N), Low (L), High (H)
Availability (A)None (N), Low (L), High (H)

Vulnerability Management Process

StepActivity
1. Asset InventoryKnow all systems, software, and versions in your environment
2. ScanningContinuous authenticated scans (Nessus, Qualys, OpenVAS)
3. AssessmentContextualize CVSS with environment: exploitability, asset criticality
4. PrioritizationRisk-based: CVSS + EPSS + KEV + asset value
5. RemediationPatch, mitigate, or accept with documented risk
6. VerificationRescan to confirm fix; update tracking system
7. ReportingMetrics: MTTR, open vulns by severity, SLA compliance

SLA Targets by Severity

CVSS ScoreSeverityTarget Patch Time
9.0โ€“10.0Critical24โ€“72 hours
7.0โ€“8.9High7โ€“14 days
4.0โ€“6.9Medium30โ€“60 days
0.1โ€“3.9Low90โ€“180 days