Skip to main content

Nist NVD

This Integration is part of the Nist NVD Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

National Vulnerability Database

Configure Nist NVD on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Nist NVD.

  3. Click Add instance to create and configure a new integration instance.

    ParameterRequired
    Nist NVD CVES URLFalse
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

nvd-get-vulnerability#


You can get latest vulnerabilities with given time from National Vulnerability Database.

Base Command#

nvd-get-vulnerability

Input#

Argument NameDescriptionRequired
timeGet vulnerability within this time frame (in days - max range is 120 days). Example: time=30. Default is 30.Required
resultsPerPageDefault: 20. Default is 20.Optional
startIndexUsing for paging. Default: 0. Default is 0.Optional

Context Output#

There is no context output for this command.

nvd-search-keyword#


The keyword parameter allows your application to retrieve records where a word or phrase is found in the vulnerability description or reference links.

Base Command#

nvd-search-keyword

Input#

Argument NameDescriptionRequired
keywordExample: keyword=apple.Required
isExactMatchIf the keyword is a phrase, i.e., contains more than one term, then the isExactMatch parameter may be used to influence the response. Use isExactMatch=true to retrieve records matching the exact phrase. Otherwise, the results contain any record having any of the terms. Possible values are: true, false. Default is true.Required
timeGet vulnerability within this time frame (in days - max range is 120 days). Example: time=30. Default is 30.Optional
resultsPerPageDefault: 20. Default is 20.Optional
startIndexUsing for paging. Default: 0. Default is 0.Optional

Context Output#

There is no context output for this command.

nvd-search-cvss#


CVSS refers to the scoring system used by NIST to assess the severity of vulnerabilities, https://www.first.org/cvss/. NVD provides base scores using the CVSS version 2 and, more recently, version 3.x.

Base Command#

nvd-search-cvss

Input#

Argument NameDescriptionRequired
cvssTypecvssV4, cvssV3 or cvssV2. Possible values are: cvssV2, csvsV3, cvssV4. Default is cvssV4.Required
keySearch parameter that use with CVSS. Example: cvssV3Metrics | cvssV4Severity. Possible values are: Severity, Metrics. Default is Severity.Required
valueTwo pairs of parameters allow you to filter vulnerabilities based on CVSS base scores. Use either the cvssV2Severity or cvssV3Severity parameter to find vulnerabilities having a LOW, MEDIUM, or HIGH version 2 or 3.x score, respectively. For CVSS V3.x, cvssV3Severity=CRITICAL is also supported. Example: cvssV2Severity=HIGH | cvssV3Metrics=C:H/A:N | cvssV3Metrics=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.Required
timeGet vulnerability within this time frame (in days - max range is 120 days). Example: time=30. Default is 30.Optional
resultsPerPageDefault: 20. Default is 20.Optional
startIndexUsing for paging. Default: 0. Default is 0.Optional

Context Output#

There is no context output for this command.

nvd-search-cwe#


CWE refers to the classification of vulnerabilities at https://cwe.mitre.org/. NIST staff associate one or more CWE to each vulnerability during the analysis process. In the following example, CWE-20 means vulnerabilities caused by Improper Input Validation. To filter search results based on CWE, use the cweId parameter. Example: cweId=CWE-20

Base Command#

nvd-search-cwe

Input#

Argument NameDescriptionRequired
cweIdExample: cweId=CWE-20.Required
timeGet vulnerability within this time frame (in days - max range is 120 days). Example: time=30. Default is 30.Optional
resultsPerPageDefault: 20. Default is 20.Optional
startIndexUsing for paging. Default: 0. Default is 0.Optional

Context Output#

There is no context output for this command.

nvd-search-cpe#


NVD analysts identify which product or products are affected by each vulnerability. The set of associated products is known as the applicability statement of the CVE. NVD uses the Common Platform Enumeration (CPE), version 2.3, to convey product vendors, names, versions, etc. For more information, see https://cpe.mitre.org/.

Base Command#

nvd-search-cpe

Input#

Argument NameDescriptionRequired
cpeExample: cpe:2.3⭕microsoft:windows_10 | cpe:2.3⭕microsoft:windows_10:1511 | cpe:2.3:*:microsoft.Required
timeGet vulnerability within this time frame (in days - max range is 120 days). Example: time=30. Default is 30.Optional
resultsPerPageDefault: 20. Default is 20.Optional
startIndexUsing for paging. Default: 0. Default is 0.Optional

Context Output#

There is no context output for this command.

nvd-search-cve#


Search specific CVE

Base Command#

nvd-search-cve

Input#

Argument NameDescriptionRequired
cveCVEID. Example: CVE-2020-1000.Required

Context Output#

There is no context output for this command.