Loopus

Pro Content

This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.

Supply Chain SecuritySoftware Bill of Materials (SBOM)

VEX (Vulnerability Exploitability eXchange)

30 min
lab
+60 XP

Learning Objectives

  • Define Vulnerability Exploitability eXchange (VEX)
  • Understand how VEX reduces "Vulnerability Noise"
  • Identify VEX status levels

VEX: Fighting Vulnerability Noise

An SBOM tells a customer that a library like openssl is present. If a CVE is announced for that version of openssl, the customer will immediately ask for a patch. However, your developers might know that your app only uses the aes-encryption part of openssl, while the vulnerability is in the heartbeat extension which you have disabled.

VEX (Vulnerability Exploitability eXchange) is the solution to this "false positive" problem.

The Companion to the SBOM


VEX is a machine-readable document (often embedded in the CycloneDX SBOM) that provides the "publisher's perspective" on a vulnerability. It allows you to assert a status for a specific CVE relative to your product:
* Not Affected: The code is present, but the vulnerability cannot be exploited (e.g., the function isn't called, or a compiler flag mitigates it).
* Affected: The flaw is real and exploitable.
* Fixed: The flaw has been mitigated in this version.
* Under Investigation: We know about it, and we're checking.

Automated Triage


By providing VEX data alongside your SBOM, you save your customers from manual triaging and protect your support teams from thousands of "Are you vulnerable to CVE-XXXX?" emails. Security scanners that ingest VEX data will automatically "silence" alerts that are marked as Not Affected.

Answer the Questions0 / 2 completed

📚 KnowledgeQuestion 1

What document asserts the ACTUAL exploiteability of a flaw?

Format: ***(3 chars)
Exact match required
⌨️ Hands-OnQuestion 2

What VEX status indicates a library is present but safe?

Format: *** ********(12 chars)
Exact match required
Answer all questions correctly to unlock the next lesson

Interactive Sandbox

Loading sandbox...

Submit Flag

Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}

Previous
Answer all questions to continue