Skip to content

MITRE CWE™

This section details MITRE Common Weakness Enumeration (MITRE CWE™). [1]



Summary

The MITRE CWE™ is a community-developed list of common software and hardware weakness types. A “weakness” is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities.

A 2025 CWE Top 25 list has been published by MITRE, providing a very useful view of the most common and dangerous weaknesses, as of 2025.

Weaknesses Vs. Vulnerabilities

In the MITRE CWE™ framework, a Weakness is an underlying flaw (e.g., inadequate input validation), while a Vulnerability is a specific occurrence of that weakness in a particular product (often tracked as a Common Vulnerabilities and Exposures, or CVE).

Hierarchical Structure

MITRE CWE™ weaknesses are organized hierarchically. Pillars represent the most abstract weaknesses, which are broken down into Classes, then into Base level weaknesses, and finally into specific Variants. For example, the abstract concept of Improper Neutralization cascades down into granular variants like SQL Injection or Cross-Site Scripting (XSS).



Mapping to SCF C|P-RMM

To map the concepts of MITRE CWE™ to the SCF C|P-RMM framework, one must align how each framework views systemic flaws and defensive gaps.

1. Weaknesses Map to Vulnerabilities

In SCF C|P-RMM, a Vulnerability is strictly defined as a Control Deficiency (a missing, ineffective, or failing defense).

The MITRE CWE™ provides a specific, standardized vocabulary to describe these very Control Deficiencies at a technical level. Therefore, instances of a CWE (a Weakness) represent the underlying technical flaws that directly constitute a Vulnerability in the SCF framework.

2. The Role in Realizing Risk

In SCF C|P-RMM, Risk is the result of a Threat exploiting a Vulnerability.

While frameworks like MITRE ATT&CK® catalog the Threats (the “who” and “how” of the attack), MITRE CWE™ catalogs the Vulnerabilities (the gaps being exploited). Without the presence of a CWE (Weakness/Vulnerability), the Threat cannot successfully materialize into actual Risk.



Critique

The MITRE CWE™ is incredibly comprehensive and serves as the taxonomic foundation for many other security frameworks, including standard application security scanners. However, because it originated in traditional software engineering, it often approaches GenAI weaknesses abstractly. For instance, Prompt Injection is typically mapped to the broader concept of Improper Neutralization of Directives in Dynamically Evaluated Code (CWE-95), which fails to articulate the nuanced, semantic nature of LLM manipulation.



References

[1] “CWE - Common Weakness Enumeration.” https://cwe.mitre.org/.