Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family RA

RA-5Vulnerability Monitoring and Scanning

Monitor and scan for vulnerabilities in the system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system are identified and reported; Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: Enumerating platforms, software flaws, and improper configurations; Formatting checklists and test procedures; and Measuring vulnerability impact; Analyze vulnerability scan reports and results from vulnerability monitoring; Remediate legitimate vulnerabilities {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk; Share information obtained from the vulnerability monitoring process and control assessments with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems; and Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (107)

Weaknesses this control addresses (9)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Scans identify improper access control implementations and missing protections on system resources.
CWE-306Missing Authentication for Critical Function2,567Tools routinely check for missing authentication on critical functions and exposed interfaces.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Permission and ACL misconfigurations on critical resources are standard findings in automated scans.
CWE-327Use of a Broken or Risky Cryptographic Algorithm736Scanners flag use of broken or weak cryptographic algorithms via known-vulnerability databases.
CWE-311Missing Encryption of Sensitive Data552Monitoring detects missing encryption of sensitive data in storage or transit configurations.
CWE-521Weak Password Requirements303Vulnerability scans assess password policies and weak credential requirements against benchmarks.
CWE-1188Initialization of a Resource with an Insecure Default300Scans detect resources initialized with insecure defaults that create exploitable conditions.
CWE-15External Control of System or Configuration Setting59Vulnerability scanners directly detect externally controllable or misconfigured settings using standardized checklists.
CWE-1104Use of Unmaintained Third Party Components19Regular scanning with updatable vulnerability feeds directly identifies unmaintained third-party components.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-2746 KEV9.39.80.8973good
CVE-2025-37164 KEV9.110.00.8521good
CVE-2025-9242 KEV8.19.80.6897partial
CVE-2025-27363 KEV7.88.10.6916good
CVE-2025-712437.19.80.8541partial
CVE-2025-26399 KEV5.69.80.2656good
CVE-2025-53521 KEV4.49.80.0745good
CVE-2026-2441 KEV4.38.80.0946partial
CVE-2025-10585 KEV4.09.80.0070partial
CVE-2025-21042 KEV4.08.80.0330partial
CVE-2026-3910 KEV3.88.80.0069good
CVE-2026-31431 KEV3.87.80.0391partial
CVE-2025-21391 KEV3.77.10.0472partial
CVE-2025-24985 KEV3.77.80.0166good
CVE-2025-48384 KEV3.68.00.0062partial
CVE-2025-38352 KEV3.57.40.0010partial
CVE-2025-24991 KEV3.25.50.0144good
CVE-2024-104422.910.00.1459partial
CVE-2025-02912.58.80.1209good
CVE-2025-276782.29.80.0464good
CVE-2026-215362.19.80.0163good
CVE-2025-479172.18.90.0516good
CVE-2026-339422.09.80.0022good
CVE-2026-323042.09.80.0015good
CVE-2026-26282.09.80.0042good

Other controls in family RA

RA-1 RA-10 RA-2 RA-3 RA-4 RA-6 RA-7 RA-8 RA-9