The Common Vulnerabilities and Exposures (CVE) program is operated by the MITRE Corporation, funded by CISA/DHS. MITRE assigns unique CVE identifiers and manages the official list. Separately, the National Vulnerability Database (NVD), maintained by NIST, imports all CVEs and enriches them with CVSS scores, CWE classifications, and CPE data.
In summary: MITRE creates the core CVE entries, NIST builds the NVD by enhancing them with detailed analysis.
CVE records tell us what is vulnerable, but not how attacks unfold or why vulnerabilities exist. We propose enriching CVE records with TLCTC v2.0’s cause-oriented threat clusters, Attack Velocity (Δt), and Data Risk Event tags to bridge the gap between vulnerability management and strategic risk management. This blog post summarizes the core idea; the full proposal is available on GitHub.
The Problem: What CVE Records Are Missing
A typical CVE entry gives us affected software, a vulnerability description, a CVSS score, and references. But it lacks three dimensions critical for strategic defense:
- The "How" (Cause vs. Outcome): When a CVE states "allows remote code execution," that describes the outcome. The same RCE could stem from #2 Exploiting Server, #3 Exploiting Client, #7 Malware, or #1 Abuse of Functions — fundamentally different threat vectors requiring different defenses.
- The "When" (Attack Velocity): CVEs describe isolated vulnerabilities, but real attacks are sequences with measurable speed. Knowing that #3 → #7 happens at VC-4 (milliseconds) tells you human response is structurally impossible — only architectural controls work.
- The "Why" (Generic Vulnerability): Every CVE exploits a generic vulnerability — the root weakness category. CVE records rarely surface this, making it hard to address entire classes of similar vulnerabilities.
The Proposal: A tlctc_extended Section for CVE Records
We propose adding an optional, backward-compatible tlctc_extended JSON section to CVE records. It includes:
- Generic vulnerability mapping — which root weakness category the CVE exploits
- TLCTC cluster classification with R-* rule justification (e.g., R-ROLE, R-EXEC)
- Attack path examples with velocity annotations (→[Δt=instant])
- Data Risk Event tags separating cause from outcome (+ [DRE: C, I, A])
- Vertical stack analysis clarifying server/client roles per R-ROLE
- NIST CSF 2.0 mapping across all six functions
Quick Example: Before and After
Before (standard CVE):
CVE-2025-21333 — Windows Hyper-V NT Kernel Integration VSP
Elevation of Privilege — CVSS 7.8 HIGH
After (with TLCTC enrichment):
CVE-2025-21333
├── CWE-416 (Use After Free)
│ └── Generic Vulnerability: Client-side code implementation flaws
│ └── #3 / TLCTC-03.00 (Exploiting Client) [R-ROLE: client processing]
│ ├── ATT&CK T1068 (Exploitation for Privilege Escalation)
│ ├── NIST CSF PR.IP-12 (Vulnerability Management)
│ ├── Attack Path: #4 →[Δt=15m] #3 →[Δt=instant] #7 + [DRE: C, I, A]
│ └── Velocity Class: VC-4 (requires architectural controls)
└── CVSS 3.1: 7.8 HIGH
Now we know the generic vulnerability, the classification rationale (R-ROLE), realistic attack sequences with velocity, and that VC-4 speed demands architectural controls over human response.
What This Enables
- Eliminates ambiguity: R-* rules replace vague "RCE" with precise cluster classification and justification
- Velocity-informed control selection: VC-4 transitions require architecture, not analysts; VC-2 transitions allow human triage
- Cause/outcome separation: Clusters identify how the attack works; DRE tags capture what happens
- Dual-audience notation: #3 for the boardroom, TLCTC-03.00 for SIEM integration
- Cross-framework alignment: Maps to ATT&CK, CWE, NIST CSF 2.0, and STIX/TAXII
Full Proposal on GitHub
This blog post is a summary. The complete proposal — including the full enhanced JSON example, all nine R-* classification rules, velocity class definitions, implementation roadmap, framework alignment details, and FAQ — is maintained on GitHub:
Full specification with JSON schema, R-* rules, worked examples, implementation roadmap, and NIST CSF mapping.
View Full Proposal on GitHubWe welcome contributions, feedback, and discussion via GitHub Issues. Whether you’re a CNA, a security tool vendor, a SOC analyst, or a standards body representative — the proposal is designed to complement (not replace) existing CVE infrastructure while adding the strategic dimensions the community needs.
Resources
- Full CVE Extension Proposal — Complete specification on GitHub
- TLCTC Repository — Framework schemas, attack paths, mappings, and tools
- TLCTC White Paper v2.0 — Complete framework documentation