Vulnerability Analysis

Report a Vulnerability

We accept reports of security vulnerabilities and serve as a coordinating body that works with affected vendors to resolve vulnerabilities.
Report a vulnerability

Download CERT Tapioca

CERT Tapioca is a virtual machine appliance (OVA) for performing man-in-the-middle network traffic analysis of software and devices.
Download CERT Tapioca

Read Our Vulnerability Notes

Our Vulnerability Notes provide timely information about software vulnerabilities we have discovered or have learned about from other sources.
Explore our Vulnerability Notes Database

Get the Latest from Our Bloggers

Get timely information about vulnerability discovery, coordination, and disclosure.
Read the CERT/CC blog

Learn About Our Coordination Proces

Using a comprehensive four-step process, we accept reported vulnerabilities, coordinate with vendors to eliminate them, and disclose them to protect users.
Learn how our process works

Use Our Open Source Tools

Our discovery tools help you find vulnerabilities in your software so that you can remove them before your software is released.
Download our tools

Our Mission: We collect, analyze, and validate emerging vulnerabilities to common computing platforms; we broadly notify operators of vulnerabilities as well as provide mitigation and remediation guidance.

The Vulnerability Analysis team helps to reduce security risks posed by software vulnerabilities by addressing the number of vulnerabilities in software that is being developed and in software that has already been deployed.

We help vendors learn how vulnerabilities are created and discovered.

We collaborate with software vendors and the researchers who discover defects in their products to support releasing vendor-supported mitigations when vulnerabilities are disclosed publicly.

We provide guidance on mitigating threats.

We help organizations and individuals mitigate the impact of threats to their computing environments by providing timely guidance about the secure configuration of common operating platforms.

We publish information about vulnerabilities.

We publish Vulnerability Notes, which describe vulnerabilities we have discovered or have received from other sources.

We blog about vulnerabilities.

We publish timely information about vulnerabilities and mitigation efforts on our CERT/CC blog.

Engage with Us

We can show you how to reduce security risks that result from software vulnerabilities.

Contact Us

Use our vulnerability reporting form to tell us if you have discovered an unresolved security vulnerability.

What Is a Vulnerability?

A vulnerability is a software defect that allows an attacker to violate an explicit (or implicit) security policy to achieve some impact (or consequence).

News & Announcements

Publications & Media

Vulnerability Notes Database
Our Vulnerability Notes provide timely information about software vulnerabilities. Vulnerability notes include summaries, technical details, remediation information, and lists of affected vendors.

Download CERT Tapioca
CERT Tapioca is a virtual machine appliance (OVA) for performing man-in-the-middle network traffic analysis of software and devices.

Why Cybersecurity Is Not Like the Immune System
The idea of a cyber-immune system sometimes circulates through the community, but it seems that such proposals either do not properly frame how the immune system works, how good computer security would work, or both. In this blog post, Jonathan Spring puts both ides in context in order to make clear why cybersecurity is not like the immune system, but why it would be nice if it were.

Updated CERT Fuzzing Tools
We have updated BFF V2.7 and FOE V2.1, the CERT Division's fuzzing tools, to include virtual machine changes.