Skip to content

Vulnerabilities (CVEs)

ShadowMap tracks Common Vulnerabilities and Exposures (CVEs) and correlates them with your organization's detected technology stack, CISA's Known Exploited Vulnerabilities (KEV) catalog, ransomware campaign usage, and threat actor intelligence. This module helps you prioritize patching by showing which CVEs actually affect your infrastructure and which are actively being exploited in the wild.

Overview

CVEs

Understanding the Data

The CVE table displays the following columns:

ColumnDescription
CVE IDUnique CVE identifier (e.g., CVE-2024-1234). Sortable.
CVSSCommon Vulnerability Scoring System score (0.0-10.0), color-coded by severity. Sortable.
SeverityCritical, High, Medium, or Low based on CVSS score ranges
KEVRed "KEV" tag if the CVE is in CISA's Known Exploited Vulnerabilities catalog
RW"RW" tag if the CVE is known to be exploited in ransomware campaigns
ExploitExploit maturity level (e.g., PoC, Weaponized, Active) indicating how readily available exploit code is
DescriptionBrief description of the vulnerability
Affected ProductsVendor and product names affected by this CVE (shows top vendors with "+N" count for additional)
ActorsCount of threat actors known to exploit this CVE
Your AssetsCount of assets in your infrastructure affected by this CVE (green tag when matches found)
PublishedDate the CVE was published to NVD. Sortable.
ModifiedDate the CVE was last modified. Sortable.

Click any row to view the full CVE detail page with complete descriptions, references, affected product versions, associated threat actors, and matching assets.

Tracked Products Banner

If you have configured CVE Alert Preferences, a banner at the top of the page shows:

  • Tracked products count -- How many vendor/product combinations you are monitoring
  • New CVEs this week -- Count of newly published CVEs affecting your tracked products
  • Critical count -- How many of the new CVEs are critical severity
  • Show Tracked Only -- Toggle to filter the table to only CVEs affecting your tracked products
  • Manage -- Link to CVE Alert Preferences to configure which products you track

Your Assets Banner

When ShadowMap detects technologies in your attack surface, a second banner shows:

  • Technologies detected -- Count of products found in your infrastructure during asset discovery
  • Show Affecting Your Assets -- Toggle to filter the table to only CVEs that match technologies in your environment

Filters

FilterOptions
SeverityCritical, High, Medium, Low
Actively ExploitedFilter to show only KEV-listed CVEs
RansomwareFilter to show only CVEs used in ransomware campaigns
VendorFilter by affected vendor (e.g., Microsoft, Apache, Fortinet)
ProductFilter by affected product (e.g., Exchange Server, Log4j, FortiOS)
Exploit MaturityFilter by exploit availability (PoC, Weaponized, Active)
SearchFree-text search across CVE IDs and descriptions

Sorting and Export

Click sortable column headers (CVE ID, CVSS, Published, Modified) to toggle ascending/descending order. Default sort is CVSS descending (highest severity first). Click the export button to download the current filtered view as an Excel file.

Why KEV Matters

CISA's Known Exploited Vulnerabilities catalog lists CVEs that are confirmed to be actively exploited in the wild. KEV-listed CVEs should be your highest patching priority because:

  • They are not theoretical -- attackers are actively using them right now
  • CISA mandates federal agencies patch KEV CVEs within specific timeframes
  • Many compliance frameworks (PCI DSS, SOC 2) reference KEV as a prioritization source
  • Insurance providers increasingly consider KEV compliance in underwriting decisions

When a CVE in your environment is flagged as KEV, treat it as a critical incident requiring immediate patching or compensating controls.

How to Prioritize CVEs

Not all CVEs are equal. Use these signals to prioritize:

  1. Your Assets > 0 -- The CVE affects technology detected in your infrastructure. This is the highest priority signal.
  2. KEV = Yes -- Confirmed active exploitation in the wild
  3. RW = Yes -- Exploited by ransomware groups, indicating imminent risk of destructive attacks
  4. Exploit = Weaponized/Active -- Exploit code is publicly available and being used
  5. Actors > 0 -- Known threat actors are leveraging this CVE
  6. CVSS >= 9.0 -- Critical severity by CVSS scoring

A CVE that matches your assets, is KEV-listed, and is used by ransomware groups should be patched within hours, not days.

ShadowMap by Security Brigade