VEX — Vulnerability Exploitability eXchange
VEX (Vulnerability Exploitability eXchange) is a machine-readable security advisory format that allows manufacturers to communicate the exploitability status of known CVEs in their products — specifically whether a CVE that appears in a component is actually exploitable in the context of how the component is used. VEX is essential for managing the false-positive burden of SBOM-based vulnerability scanning.
VEX (Vulnerability Exploitability eXchange) is a machine-readable security advisory format that allows manufacturers to communicate the exploitability status of known CVEs in their products — specifically whether a CVE that appears in a component is actually exploitable in the context of how the component is used. VEX is essential for managing the false-positive burden of SBOM-based vulnerability scanning.
Security Standards & FrameworksWhat Is a VEX Document?
A VEX (Vulnerability Exploitability eXchange) document is a machine-readable security statement that communicates a manufacturer's assessment of whether a specific CVE is exploitable in the context of a specific product version. VEX addresses a fundamental challenge in SBOM-based vulnerability management: a component may be listed as vulnerable in the NVD, but the vulnerable function may not be compiled in, may not be reachable via any code path, or may be mitigated by the product's architecture. VEX provides four status values: Not Affected, Affected, Fixed, and Under Investigation — allowing manufacturers to give precise, actionable exploitability statements rather than leaving users to assume every CVE in their component list is a live risk.
Why VEX Matters for CRA Compliance
The CRA requires manufacturers to communicate information about identified vulnerabilities and available remediations to users. VEX provides the standardised, machine-readable mechanism for this communication — enabling downstream users (enterprises, system integrators, distributors) to automatically process the manufacturer's exploitability assessments without manual review. For manufacturers with complex products containing hundreds of open-source components, VEX also reduces the operational burden of vulnerability management: instead of being pressured to patch every CVE in an SBOM regardless of exploitability, manufacturers can formally communicate 'Not Affected' status with justification, reducing user anxiety and support burden while focusing engineering effort on genuinely exploitable vulnerabilities.
How Manufacturers Generate and Use VEX
VEX documents can be generated as standalone files or embedded within CSAF (Common Security Advisory Framework) documents or CycloneDX SBOMs. The CSAF standard includes a VEX profile, making it the most common format for EU regulatory contexts. Manufacturers should generate VEX statements as part of their routine vulnerability management workflow: when SCA scanning identifies a CVE in a component, the PSIRT team assesses exploitability, assigns a VEX status with a justification, and publishes the VEX document alongside or within the relevant SBOM or CSAF advisory. VEX documents should be versioned and updated as exploitability status changes — for example, if a 'Not Affected' determination is later found to be incorrect due to a different attack vector being discovered.
Common Mistakes
A critical mistake is issuing 'Not Affected' VEX statements without conducting a genuine exploitability analysis — simply to reduce the visible vulnerability count in SBOM reports. This constitutes misrepresentation to users and may constitute non-compliance with the CRA's requirement to provide accurate vulnerability information. Manufacturers must document the justification for 'Not Affected' determinations: CISA's VEX guidance provides specific justification categories (component not present, vulnerable code not in execution path, vulnerable code not reachable, inline mitigations exist). A second error is treating VEX as a one-time document rather than a living artefact that must be updated when new attack paths are discovered.
CVD Portal makes VEX — Vulnerability Exploitability eXchange compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Is VEX required by the EU Cyber Resilience Act?+
VEX is not explicitly required by name in the CRA, but the regulation requires manufacturers to provide users with accurate information about the exploitability of vulnerabilities in their products and to communicate remediation status. VEX is the standardised format for meeting this requirement in a machine-readable, scalable way. ENISA's guidance on SBOM and CSAF references VEX as a recommended mechanism. Manufacturers shipping products with complex component trees should treat VEX generation as a best-practice CRA implementation rather than an optional extra.
What is the difference between a VEX document and a security advisory?+
A security advisory (in formats like CSAF) communicates that a manufacturer has identified and fixed a vulnerability, and provides remediation guidance. A VEX document specifically communicates the exploitability status of known CVEs in a product — including CVEs the manufacturer has determined are not exploitable. VEX and security advisories serve complementary purposes: advisories address vulnerabilities requiring user action; VEX addresses the broader set of CVEs surfaced by SBOM scanning, including those that require no action because they are not exploitable in the product's specific context.
Can VEX statements be embedded in SBOM documents?+
Yes. The CycloneDX SBOM standard supports embedding VEX statements directly within an SBOM document, creating a unified artefact that describes both the product's components and the manufacturer's exploitability assessment for known CVEs affecting those components. This approach is convenient for distribution alongside product releases. Alternatively, VEX can be published as a standalone document in CSAF VEX profile format. Both approaches are acceptable; manufacturers should choose the format that integrates best with their users' vulnerability management tooling.
Related terms
Browse the full CRA Compliance Checklist
See how VEX — Vulnerability Exploitability eXchange fits into your complete CRA compliance programme.