
CVE Scan, your Linux vulnerability scanner & remediation tool
Detect vulnerabilities, comply with cybersecurity regulations and minimize maintenance time.
✓ Advanced filtering on Linux kernel
✓ Efficient vulnerability lifecycle management
✓ Full control over sensitive security data

Why vulnerability management matters
Safeguard your device from critical threats
Vulnerabilities leave devices open to severe cyberattacks. CVE Scan filters the noise, prioritizes critical risks, and streamlines remediation to keep your systems secure.
Speed up compliance
CVE Scan automates vulnerability management, helping you meet regulations like the Cyber Resilience Act. Demonstrate product security to your customers, and document decisions for audits.
Streamline maintenance across platforms
Save time by effectively managing Linux vulnerabilities across all platforms and products, minimizing redundant work with CVE Scan annotation system.
Control critical security data
CVE Scan integrates into your on-premises infrastructure, providing complete oversight of sensitive data. Its containerized setup enables quick deployment and CI pipeline integration.
They already use our CVE scanner




CVE Scan Linux vulnerability scanner features
SBOM generation
Easily generate and manage your Software Bill of Materials (SBOM) for vulnerability tracking. CVE Scan provides a dedicated SBOM generation layer for Yocto, Buildroot, and Zephyr, enabling advanced filtering on Linux kernel vulnerabilities.
CVE Scan also supports standard SBOM formats like SPDX and CycloneDX, allowing you to extend vulnerability tracking across your entire system, including containers, applications, and RTOS.







Vulnerability inventory
CVE Scan analyzes your SBOM, cross-referencing it with public vulnerability databases such as NVD, Ubuntu CVE tracker, and OSV.
By leveraging product identifiers and versions, the tool identifies relevant vulnerabilities and provides actionable insights tailored to your specific configurations.
Advanced filtering mechanism
CVE Scan will narrow impacting Linux kernel vulnerabilities by considering affected sources and tied configurations. It will also look for applied corresponding patches (either mainlined or backported). It generates visual reports with scoring and detailed information to determine which vulnerabilities pose a risk—and how to address them effectively.


CVE lifecycle management & audit
All vulnerability manual annotations are recorded with detailed date and status to provide an audit of security activities.
With its monitoring dashboards, multiple platform capabilities, and database update, CVE Scan helps you optimize maintenance workflows and provide a clear view of evolving cybersecurity risks.
Streamline vulnerability tracking by integrating CVE management into CI pipelines for daily monitoring.
User rights management
Ensure that sensitive data is accessible only to the appropriate collaborators within your organization by accurately managing users, roles, and permissions to enhance security.


Documentation & reporting
Track all security activities in a comprehensive dashboard.
Collaborate on CVE patching with team members using comments and annotations, and easily export analysis results in user-friendly formats.
Share detailed reports effortlessly to ensure alignment across teams.
Local support
When you purchase a CVEScan license, we open a private support channel just for you. This gives you a direct line to our dev team for questions, updates, and technical guidance, whenever you need it.

CVE Scan offering
SAAS
Cloud
- All features
- Hosted in our infrastructure
- Updates, fixes & support
PRO
On-premise
Easily monitor vulnerabilities while keeping sensitive data internal.
- All features
- Hosted in your infrastructure
- Updates, fixes & support
OWNERSHIP
Source code
Easily monitor CVEs and keep sensitive data internal without vendor dependency.
- Lifetime source cde
- Hosted in your infrastructure
- Updates, fixes & support on demand
Why R&D teams prefer CVEScan?


Get a technical demo
In 30 minutes or 1 hour, dive right into what matters to you with Pierre, our Head of Product:
✓ Ask any questions: SBOM generation, CVE retrieval techniques, integrations, etc.
✓ Get a demo: High level on key features? Focus on specifics? Up to you.
✓ Discuss how the Embedded Kit CVE scanner could fit into your security maintenance lifecycle.
FAQ: What you need to know about CVE Scan Linux vulnerability scanner
CVE stands for Common Vulnerabilities and Exposures. It’s a standardized way to identify known cybersecurity vulnerabilities in software and hardware products. If you’re new to CVEs, check out our blog post on how to monitor your Linux.
No, but with the license you get perpetual access to the source code of our CVE scanner. You will have all the needed source code and documentation to rebuild your own Linux vulnerability scanner on your side. The license provides you with access to updates for one year. Then, if you wish to continue receiving the latest updates and fixes, you have the option to subscribe annually.
None at all! You can use CVE Scan across unlimited users, projects, and devices. You own the source code and can deploy it freely across your embedded systems (Yocto, Buildroot, Zephyr, etc).
Which systems are compatible with CVE Scan?
CVE Scan works out-of-the-box with embedded systems built using:
- Yocto Project (including versions like Dunfell, Scarthgap, and more)
- Buildroot
- Zephyr Project
If you’re using a different embedded system, integration is still possible—just a minor code tweak might be needed. Reach out to our team to know more.
Yes! If you can export a SBOM (Software Bill of Materials) in SPDX or CycloneDX format, CVE Scan can analyze it. This is a key feature of our v2 release, which integrates the OSV database to scan all software layers—not just Yocto.
CVE Scan provides a higher level of automated analysis accuracy, including advanced matching on package names and versions, detection of Yocto patches and kernel fix commits (including cherry-picks), and utilization of kernel configuration for analysis. In contrast, CVE check offers more basic capabilities, ignoring kernel configuration and reporting CVEs for all recipes involved in the build. CVE Scan offers an optimized manual analysis with annotations, allowing for detailed investigation, while CVE check provides an unoptimized manual analysis without the provision for manual annotations. Finally, The Embedded Kit Linux vulnerability scanner involves a one-time fee and a yearly maintenance fee, while CVE check is provided for free.
We pull data from:
This ensures broad coverage and up-to-date vulnerability information.
We are currently working with a research laboratory and the BPI on a machine learning algorithm to detect abnormal situations and vulnerabilities. Learn more about the results of our collaboration here.
You can consult our article on vulnerability management requirements for the CRA here and our synthesis on the Cyber Resilience Act here.
Both options give you access to the same powerful vulnerability scanner—but they’re designed for different needs when it comes to ownership, flexibility, and cost.
Source code version:
- You get full ownership of the code—no vendor lock-in.
- Use it for as long as you want, across all your projects and devices.
- You can customize the tool to fit your workflow—add custom fields in reports, tweak annotations, or integrate it with your internal systems.
- You can subscribe to yearly maintenance (optional) to get updates, improvements, and support.
- You pay more upfront, but less in the long run (the initial fee can be treated as CAPEX).
On-premise version
- You get a ready-to-use version of the tool—no setup, no customization.
- You’ll need to renew your license annually to keep using it.
- You still get full performance and no usage limitations—same engine, same results.
- You pay less at the beginning, but more over time (all fees are considered OPEX).
In short:
- If you want control and long-term flexibility, go with the source code.
- If you want a plug-and-play experience with predictable yearly costs, the on-prem version is for you.