Skip to main content

National Vulnerability Database Feed v2

This Integration is part of the NVD Feed 2.0 Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

CVE feed from the National Vulnerability Database.

This integration was built and tested with version 2.0 of National Vulnerability Database API. See the NVD Developer API documentation for more information.

An API key for this feed can be obtained at the NIST NVD Developer Website

This integration supports the latest CVSS - Common Vulnerability Scoring System standard - CVSS Version 4.0.

Configure National Vulnerability Database in Cortex#

ParameterDescriptionRequired
Fetch indicatorsFalse
API KeyFalse
Keyword SearchReturns only the CVEs where the word or phrase is found in the description.False
CVSS Severity FilterFilter CVEs by severity. Queries each CVSS version selected in 'CVSS Versions'.False
CVSS VersionsCVSS versions to query when the severity filter is set. By default, covers most modern CVEs.False
Max Indicators Per FetchThe maximum number of indicators to fetch per interval. A lower value prevents timeouts during initial syncs with large lookback windows. The fetch will automatically resume from where it left off in the next interval. Without an API key, the recommended maximum is 40000. With an API key, the recommended maximum is 200000.True
First fetch timeHow far back should the integration fetch in its first run (1 day, 2 weeks, 3 months, etc.)False
Return Known Exploited Vulnerabilities (KEV) only.See the following for more information: https://nvd.nist.gov/developers/vulnerabilities#cves-hasKevFalse
Source ReliabilityReliability of the source providing the intelligence dataTrue
Indicator ReputationIndicators from this integration instance will be marked with this reputation.False
False
Feed Fetch IntervalFalse
False
Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
Trust any certificate (not secure)False
Use system proxy settingsFalse
TagsSupports CSV values.False
Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed.False

NOTE ONE - Sample Debug Output - /var/log/demisto/integration_instance.log#

ParameterValueDescription
lastModStartDateDATE/TIME UTCThe start date for the current CVE fetch cycle.
lastModEndDateDATE/TIME UTCThe end date for the current CVE fetch cycle.
Fetch I terationIntegerCurrent iteration of the overall fetch from NIST NVD.
Iteration CountIntegerIteration round through the current fetch cycle. NVD breaks up fetches into chunks to alleviate server load. This is the current count through one of the chunks of CVE data.
Total Results for IterationIntegerTotal results returned for this fetch cycle chunk.
Current Total Fetched Indicator CountIntegerTotal number of CVEs fetched overall.
lastModStartDate: 2008-09-11T00:00:00.000
lastModEndDate: 2009-01-09T00:00:00.000
Fetch Iteration: 5
Iteration Count: 0
Total Results for Iteration: 1
Current Total Fetched Indicator Count: 4184

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook.

nvd-get-indicators#


Manually retrieve CVEs from NVD using the history parameter for the duration back to fetch. CVSS severity and version filters can be overridden for this command.

Base Command#

!nvd-get-indicators history="7 days"

Input#

Argument NameDescriptionRequired
historyTime back to retrieve CVEs, e.g. 7 days. Possible values are: 7 days.Required
keywordKeywords to query CVEs by.Optional
limitThe maximum number of CVEs to return. Use a lower value to avoid timeouts due to large lookback windows. Default is 50.Optional
cvss_severityA comma-separated list of CVSS severities to use for this command. This overrides the instance-level CVSS Severity Filter. If left blank, the instance-level filter is used. Possible values are: CRITICAL, HIGH, MEDIUM, LOW.Optional
cvss_versionsOverride the instance-level CVSS Versions for this command. Comma-separated list. Possible values are: CVSS v4, CVSS v3, CVSS v2.Optional

Context Output#

PathTypeDescription
CVE.IDStringThe ID of the CVE.
CVE.CVSSNumberThe CVSS score of the CVE.
CVE.PublishedDateThe date the CVE was published.
CVE.ModifiedDateThe date that the CVE was last modified.
CVE.DescriptionStringThe description of the CVE.
CVE.CVSSVersionStringThe CVSS version used for scoring (e.g. 4.0, 3.1, 2.0).
CVE.SeverityStringThe CVSS severity level (e.g. CRITICAL, HIGH, MEDIUM, LOW).