CVE2CAPEC: CVE AND MITRE MAPPING

Let’s summarize what we have now:

  • a list of potential attackers,

  • the techniques they use,

  • the mitigation and detection solutions for these techniques,

  • a better understanding of your EDR/XDR protection capabilities,

  • a tool to test your solutions and incident response teams.

One important point is mapping vulnerabilities (CVE) to techniques in MITRE ATT&CK. If you can obtain CVEs that are relevant to your organization, you can better plan defenses by associating them with an identified attack path.

Last updated