CVE2CAPEC: CVE AND MITRE MAPPING
Let’s summarize what we have now:
a list of potential attackers,
the techniques they use,
the mitigation and detection solutions for these techniques,
a better understanding of your EDR/XDR protection capabilities,
a tool to test your solutions and incident response teams.
One important point is mapping vulnerabilities (CVE) to techniques in MITRE ATT&CK. If you can obtain CVEs that are relevant to your organization, you can better plan defenses by associating them with an identified attack path.
Last updated