Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family RA

RA-5Vulnerability Monitoring and Scanning

Monitor and scan for vulnerabilities in the system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system are identified and reported; Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: Enumerating platforms, software flaws, and improper configurations; Formatting checklists and test procedures; and Measuring vulnerability impact; Analyze vulnerability scan reports and results from vulnerability monitoring; Remediate legitimate vulnerabilities {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk; Share information obtained from the vulnerability monitoring process and control assessments with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems; and Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (107)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,905Scans identify improper access control implementations and missing protections on system resources.
CWE-306Missing Authentication for Critical Function2,600Tools routinely check for missing authentication on critical functions and exposed interfaces.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Permission and ACL misconfigurations on critical resources are standard findings in automated scans.
CWE-327Use of a Broken or Risky Cryptographic Algorithm739Scanners flag use of broken or weak cryptographic algorithms via known-vulnerability databases.
CWE-311Missing Encryption of Sensitive Data552Monitoring detects missing encryption of sensitive data in storage or transit configurations.
CWE-1188Initialization of a Resource with an Insecure Default309Scans detect resources initialized with insecure defaults that create exploitable conditions.
CWE-521Weak Password Requirements303Vulnerability scans assess password policies and weak credential requirements against benchmarks.
CWE-15External Control of System or Configuration Setting60Vulnerability scanners directly detect externally controllable or misconfigured settings using standardized checklists.
CWE-1104Use of Unmaintained Third Party Components20Regular scanning with updatable vulnerability feeds directly identifies unmaintained third-party components.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-2746 KEV9.39.80.8973good
CVE-2025-37164 KEV8.510.00.7528good
CVE-2025-9242 KEV8.49.80.7349partial
CVE-2025-27363 KEV UPD7.88.10.7034good
CVE-2025-712437.19.80.8541partial
CVE-2025-26399 KEV5.69.80.2675good
CVE-2026-2441 KEV5.18.80.2313partial
CVE-2025-53521 KEV4.49.80.0745good
CVE-2025-10585 KEV4.09.80.0070partial
CVE-2025-21042 KEV4.08.80.0330partial
CVE-2026-3910 KEV3.88.80.0094good
CVE-2026-31431 KEV UPD3.77.80.0257partial
CVE-2025-21391 KEV3.77.10.0472partial
CVE-2025-24985 KEV3.77.80.0223good
CVE-2025-48384 KEV3.68.00.0060partial
CVE-2025-38352 KEV3.57.40.0014partial
CVE-2025-24991 KEV3.25.50.0156good
CVE-2024-104422.910.00.1459partial
CVE-2025-02912.58.80.1209good
CVE-2025-479172.38.90.0843good
CVE-2025-276782.29.80.0464good
CVE-2026-215362.19.80.0170good
CVE-2026-218762.19.30.0359partial
CVE-2026-339422.09.80.0022good
CVE-2026-323042.09.80.0016good

Other controls in family RA

RA-1 RA-10 RA-2 RA-3 RA-4 RA-6 RA-7 RA-8 RA-9