NIST 800-53 r5 · Controls catalogue · Family SI
SI-5Security Alerts, Advisories, and Directives
Receive system security alerts, advisories, and directives from {{ insert: param, si-05_odp.01 }} on an ongoing basis; Generate internal security alerts, advisories, and directives as deemed necessary; Disseminate security alerts, advisories, and directives to: {{ insert: param, si-05_odp.02 }} ; and Implement security directives in accordance with established time frames, or notify the issuing organization of the degree of noncompliance.
Last updated: 09 May 2026 03:25 UTC
Implementations targeting this control (0)
- No implementations targeting this control yet.
ATT&CK techniques this control mitigates (4)
Weaknesses this control addresses (4)AI
CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.
| CWE | Name | CVEs | Why this control addresses it |
|---|---|---|---|
CWE-798 | Use of Hard-coded Credentials | 1,955 | Advisories about products containing hard-coded credentials allow organizations to apply mitigations or avoid affected components before exploitation. |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm | 736 | Security alerts and directives routinely identify broken or risky cryptographic algorithms and require their replacement within defined time frames. |
CWE-693 | Protection Mechanism Failure | 476 | Implementing issued security directives maintains the effectiveness of existing protection mechanisms against newly discovered bypasses or failures. |
CWE-1104 | Use of Unmaintained Third Party Components | 19 | Ongoing receipt and implementation of security advisories directly enables timely replacement or mitigation of unmaintained third-party components before known vulnerabilities are exploited. |
Top CVEs where this control is the strongest mitigation
| CVE | Risk | CVSS | EPSS | Match |
|---|---|---|---|---|
CVE-2024-55591 KEV | 9.6 | 9.8 | 0.9406 | good |
CVE-2025-64446 KEV | 9.5 | 9.8 | 0.9291 | good |
CVE-2026-21513 KEV | 5.4 | 8.8 | 0.2811 | good |
CVE-2025-59718 KEV | 4.5 | 9.8 | 0.0939 | good |
CVE-2026-34621 KEV | 4.3 | 8.6 | 0.0990 | partial |
CVE-2026-21525 KEV | 3.8 | 6.2 | 0.0939 | partial |
CVE-2025-24990 KEV | 3.7 | 7.8 | 0.0276 | good |
CVE-2026-32202 KEV | 3.3 | 4.3 | 0.0719 | partial |
CVE-2025-59707 | 2.0 | 9.8 | 0.0031 | good |
CVE-2025-59388 | 2.0 | 9.8 | 0.0019 | good |
CVE-2026-2761 | 2.0 | 10.0 | 0.0014 | good |
CVE-2025-59245 | 2.0 | 9.8 | 0.0109 | good |
CVE-2026-4692 | 2.0 | 10.0 | 0.0003 | good |
CVE-2026-6768 | 2.0 | 9.8 | 0.0005 | good |
CVE-2026-31436 | 2.0 | 9.8 | 0.0006 | partial |
CVE-2026-6771 | 2.0 | 9.8 | 0.0006 | partial |
CVE-2026-2764 | 2.0 | 9.8 | 0.0003 | partial |
CVE-2026-2784 | 2.0 | 9.8 | 0.0002 | partial |
CVE-2026-0879 | 2.0 | 9.8 | 0.0003 | partial |
CVE-2025-8031 | 2.0 | 9.8 | 0.0015 | partial |
CVE-2026-31448 | 1.9 | 9.4 | 0.0007 | good |
CVE-2025-32991 | 1.8 | 9.0 | 0.0029 | good |
CVE-2025-13659 | 1.8 | 8.8 | 0.0061 | partial |
CVE-2026-4724 | 1.8 | 9.1 | 0.0002 | good |
CVE-2025-1914 | 1.8 | 8.8 | 0.0095 | good |