How to get your first CVE

Aditya Chauhan
2 min readFeb 15, 2023

--

If you are a software developer or security researcher, you may be interested in registering your first CVE (Common Vulnerabilities and Exposures) entry. CVEs are unique identifiers assigned to publicly disclosed security vulnerabilities in software systems, allowing stakeholders to easily track and discuss security issues. Here’s a step-by-step guide on how to register your first CVE:

Step 1: Identify the Vulnerability

The first step in registering a CVE is to identify a security vulnerability in software. This could be a vulnerability in software that you developed or in software developed by others that you discovered while conducting security research.

Step 2: Determine If the Vulnerability Qualifies for a CVE

Not all security vulnerabilities qualify for a CVE. To qualify for a CVE, a vulnerability must meet certain criteria, such as being publicly disclosed, having a potential impact on the security of a system or application, and being reproducible. To determine if a vulnerability qualifies for a CVE, review the CVE Eligibility Criteria on the MITRE website.

Step 3: Gather Information about the Vulnerability

To register a CVE, you will need to provide detailed information about the vulnerability, including a description of the vulnerability, information about the affected software and version, and details on how the vulnerability can be exploited.

Step 4: Contact a CVE Numbering Authority

A CVE Numbering Authority (CNA) is an organization that assigns CVE IDs to vulnerabilities. To register a CVE, you will need to contact a CNA and provide them with the information you gathered in step 3. The CNA will review your submission and assign a CVE ID if they determine that the vulnerability meets the criteria for a CVE.

Step 5: Publicly Disclose the Vulnerability

Once you have received a CVE ID, you will need to publicly disclose the vulnerability. This can be done through a security advisory, a bug report, or by notifying the vendor of the affected software. It is important to follow responsible disclosure practices to minimize the risk of exploitation.

Step 6: Keep Your CVE Entry Up to Date

After your CVE entry has been assigned, it is important to keep it up to date with any new information about the vulnerability. This can include additional details about the vulnerability, updates on affected software and versions, and information on patches or workarounds.

In conclusion, registering your first CVE can be a rewarding experience for software developers and security researchers. By following the steps outlined above, you can contribute to the security of software systems and help promote responsible disclosure practices. Remember, CVEs are just one part of a comprehensive security strategy, and it’s important to prioritize security throughout the development lifecycle.

--

--

Aditya Chauhan

ISO 27001 LA | VAPT | Synack Red Teamer | HTB Dante | HTB RASTA | HTB Cybernetics | HTB Offshore | HTB APTLabs | Cyber Security Analyst | Security Researcher