CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
 
ID

Root Cause Mapping of Vulnerabilities


Root cause mapping” is the identification of the underlying cause(s) of a vulnerability. This is best done by correlating CVE Records and/or bug or vulnerability tickets with CWE entries.

Accurate and precise root cause mapping is valuable because it directly illuminates where investments, policy, and practices can address the root causes responsible for vulnerabilities so that they can be eliminated.

View our new and improved root cause mapping guidance here.

Community Engagement
Hardware CWE Special Interest Group
 Join HW CWE SIG
ICS/OT Special Interest Group
 Join ICS/OT SIG
REST API Working Group
 Join REST API WG
User Experience Working Group
 Join UE WG
CWE/CAPEC Board
 Read meeting minutes
Page Last Updated: March 22, 2024