US Government Cybersecurity Alert Monitor avatar

US Government Cybersecurity Alert Monitor

Pricing

$100.00 / 1,000 charged when a cve vulnerability analysis is succes

Go to Apify Store
US Government Cybersecurity Alert Monitor

US Government Cybersecurity Alert Monitor

Get daily alerts from US government cybersecurity agencies about new security threats and vulnerabilities affecting your systems.

Pricing

$100.00 / 1,000 charged when a cve vulnerability analysis is succes

Rating

0.0

(0)

Developer

daehwan kim

daehwan kim

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

7 days ago

Last modified

Share

CVE Vulnerability Priority Scorer

Stop triaging vulnerabilities by raw CVSS score alone. This actor enriches every CVE with active exploitation status from the CISA Known Exploited Vulnerabilities catalog, attack complexity from the CVSS vector, MITRE ATT&CK technique mapping, and real-world exposure window — then produces a 0–100 priority score with a concrete patch deadline so your security team fixes the right things first.

What does CVE Vulnerability Priority Scorer do?

  • Fetches full CVE details from NIST NVD API 2.0 (CVSS scores, CWE IDs, affected configurations)
  • Cross-references every CVE against the CISA Known Exploited Vulnerabilities (KEV) catalog including ransomware campaign flags
  • Parses CVSS vector strings to extract attack vector, complexity, and privileges-required dimensions
  • Maps CWE weakness IDs to MITRE ATT&CK techniques and tactics using a curated local table
  • Outputs a priority score, urgency tier (CRITICAL/HIGH/MEDIUM/LOW), and a specific patch deadline date

Key Features

  • Multi-Source Cross-Validation: Combines NIST NVD, CISA KEV catalog, and MITRE ATT&CK for context-aware prioritization beyond raw CVSS
  • Scoring System: Produces a 0–100 priority score mapped to actionable urgency tiers with concrete patch deadlines
  • Flexible Query Modes: Search by CVE ID (e.g. CVE-2024-1234), keyword (e.g. apache log4j), or CPE string
  • Batch Processing: Score up to 2,000 CVEs in a single run, sorted by priority descending
  • Ransomware Flagging: Highlights CVEs with confirmed ransomware campaign association from CISA data
  • Pay Per Event: Only $0.05 per analysis — no subscription needed

Input

ParameterTypeRequiredDescription
querystringYesCVE ID, keyword, or CPE string
queryTypestringNocve_id, keyword (default), or cpe
maxResultsnumberNoMaximum CVEs to return (default: 20, max: 2000)
nvdApiKeystringNoNVD API key for faster rate limits

Output Example

{
"cveId": "CVE-2021-44228",
"priorityScore": 98,
"urgency": "CRITICAL — Patch immediately (24-48 hours)",
"patchDeadline": "2024-01-17",
"cvssScore": 10.0,
"cvssSeverity": "CRITICAL",
"cvssVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"exploitedInWild": true,
"cisaKevDetails": {
"dateAdded": "2021-12-10",
"requiredAction": "Apply updates per vendor instructions.",
"dueDate": "2021-12-24",
"knownRansomwareCampaignUse": true,
"product": "Log4j2"
},
"attackTechniques": [
{ "id": "T1190", "name": "Exploit Public-Facing Application", "tactic": "Initial Access" }
],
"cweIds": ["CWE-502"],
"verdict": "CVE-2021-44228 (score 98/100) is actively exploited in the wild (CISA KEV), critical CVSS severity, associated with ransomware campaigns, remotely exploitable over network, no authentication required.",
"flags": ["IN_CISA_KEV", "RANSOMWARE", "NETWORK_EXPLOITABLE", "NO_AUTH_REQUIRED", "CRITICAL_CVSS"],
"scoreBreakdown": {
"cvss": 35,
"exploitation": 35,
"attackComplexity": 20,
"exposureWindow": 15,
"total": 98
},
"sources": {
"nvd": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228",
"cisaKev": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"mitre": "https://attack.mitre.org/"
},
"timestamp": "2024-01-15T10:30:00Z"
}

Use Cases

  • Vulnerability Management Platforms: Replace manual CVSS triage with automated contextual scoring for faster remediation workflows
  • Security Operations Centers (SOC): Daily CVE feed enrichment to focus analyst attention on actively exploited vulnerabilities
  • MSSPs: Deliver prioritized patch reports to clients with clear patch deadlines rather than raw severity ratings
  • Penetration Testing Teams: Identify highest-impact targets for authorized red team engagements

Data Sources

SourceCoverageRate Limit
NIST NVD API 2.0250K+ CVEs with CVSS scores5 req/30s free; 50 req/30s with key
CISA KEV Catalog1,100+ known exploited vulnerabilitiesFree, no key required
MITRE ATT&CK200+ techniques, local CWE mapping tableFree, no key required

Scoring Breakdown

DimensionMax PointsWhat It Measures
CVSS Severity35Base CVSS score (9.0+ = 35 pts)
Active Exploitation30Presence in CISA KEV (ransomware = +5 bonus)
Attack Complexity20Network vector + low complexity + no-auth = max
Exposure Window15Age of vulnerability (>1 year unpatched = max)

Patch Deadline Logic

Urgency TierScore RangeDeadline
CRITICAL80–10024–48 hours
HIGH60–797 days
MEDIUM40–5930 days
LOW20–3990 days
INFORMATIONAL0–19Monitor only

Pricing

This actor uses Pay Per Event pricing at $0.05 per analysis. You only pay for successful analyses.

API Keys (Optional)

Some data sources work better with API keys. Set these as environment variables:

  • NVD_API_KEY: Increases NVD rate limit from 5 to 50 requests/30 seconds for bulk CVE lookups — Get free key here

Without a key, the actor still works but paginates slowly through large result sets.


Extend this actor with the ntriqpro intelligence network:

⭐ Love it? Leave a Review

Your rating helps professionals discover this actor. Rate it here.