Importing data with the NVD and CWE integrations and managing third-party libraries

  • Release version: Zurich
  • Updated July 31, 2025
  • 2 minutes to read
  • Summarize
    Summarized using AI
    This content was generated using new OpenAI-powered functionality. Results are provided on an as is basis and are not guaranteed to be accurate or complete.

    Summary of Importing Data with the NVD and CWE Integrations and Managing Third-Party Libraries

    This document outlines the process for importing vulnerability data using the National Vulnerability Database (NVD) and Common Weakness Enumeration (CWE) integrations within ServiceNow's Vulnerability Response module. It emphasizes the importance of these integrations for enriching vulnerability data and aiding in remediation decisions.

    Show full answer Show less

    Key Features

    • NVD and CWE Integrations: Essential for importing and updating vulnerability data to enhance risk assessment and remediation strategies.
    • Common Vulnerability Scoring System (CVSS): Provides a standardized measure of vulnerability severity, aiding in prioritization for remediation.
    • Scheduled Updates: Allows for automatic or on-demand updates of library records, ensuring data remains current.
    • Library Records: Includes lists of vulnerabilities from NVD, community-developed weaknesses from CWE, and third-party vulnerabilities.

    Key Outcomes

    By utilizing the NVD and CWE integrations, customers can effectively manage and prioritize vulnerabilities, leading to improved security posture. Regular updates ensure that the data used in decision-making is timely and relevant, ultimately supporting a proactive approach to vulnerability management.

    If not already installed, download and run the NVD integration and run the CWE scheduled job as part of your initial setup of Vulnerability Response and prior to importing vulnerability data into your instance with a third-party scanner product. The Vulnerability Response Integration with NVD is available on the ServiceNow Store.

    Ingesting CWE and NVD data

    Imported data from the NVD and CWE integrations are used to enrich the vulnerability data in your instance and help you decide whether to escalate remediation for a vulnerability, vulnerable item, or remediation task. After an initial import, you can update library records on-demand or configure a scheduled job to update records regularly. Vulnerability Response stores them under Libraries.

    The Common Vulnerability Scoring System (CVSS), included in NVD and third-party entries, captures the main characteristics of a vulnerability. Vulnerability Response uses CVSS data to produce a normalized value reflecting vulnerability severity. When the severity is computed, the vulnerability provides a better understanding of the risk posed by this vulnerability to your organization. Severity helps you assess and prioritize vulnerability remediation.

    If this is your first installation of Vulnerability Response, or prior to ingesting data for the first time with a third-party scanner product:

    1. Perform an initial import of CWE data with the CWE Comprehensive 2000 Integration.

      See Configure and run the scheduled job for updating CWE records for more information. You perform CWE updates On Demand from the integration record by default, and you must configure it if you want it to run as a scheduled job.

      Note:
      Schedule the CWE update to run prior to the NVD database update. The default day for the NVD update is Weekly on Monday.
    2. Verify the Vulnerability Response Integration with NVD application is installed, and data from the NIST National Vulnerability Database Integration - API (CVE only) or the NIST National Vulnerability Database Integration - API (CVE and CPE) is successfully imported.

      Activation of this plugin on production instances may require a separate license. After it is installed, the NIST National Vulnerability Database Integration - API (CVE only) integration is activated by default. It runs daily. See Understanding the NVD integrations and Install the Vulnerability Response Integration with the NIST National Vulnerability Database for more information.

    3. Third-party libraries are updated as scheduled jobs. Refer to your integration documentation at Vulnerability Response integrations for more information about third-party integrations.

    Viewing imported vulnerability data and vulnerable items

    The following libraries are available:
    Libraries Description
    NVD List of vulnerabilities found by NVD and includes security checklists, security-related software flaws, misconfigurations, product names, and impact metrics including exploits.
    CWE

    List of community-developed software weakness types.

    Each CWE record also includes an associated knowledge article that describes the weakness. You cannot escalate a vulnerability from the Common Weakness Enumerations screen, it is for reference only.

    Third-party List of imported third-party vulnerabilities in your instance. Contains a list of related references, vulnerable items, exploits, and CVEs.