CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home >  
ID

Root Cause Mapping of Vulnerabilities


Root cause mapping” is the identification of the underlying cause(s) of a vulnerability. This is best done by correlating CVE Records and/or bug or vulnerability tickets with CWE entries.

Accurate and precise root cause mapping is valuable because it directly illuminates where investments, policy, and practices can address the root causes responsible for vulnerabilities so that they can be eliminated.

View our new and improved root cause mapping guidance here.

Community Engagement
Artificial Intelligence Working Group
 Join AI WG
Hardware CWE Special Interest Group
 Join HW CWE SIG
Root Cause Mapping Working Group
 Join RCM WG
User Experience Working Group
 Join UE WG
CWE Board
 Read meeting minutes
Page Last Updated: June 17, 2024