No, CVEs do not only concern software. They can also cover vulnerabilities in hardware, firmware, IoT components, operating systems, and even certain dangerous default configurations. For example, flaws in routers, processors, or industrial equipment can also receive CVE identifiers.
This broad coverage allows for the consideration of different attack vectors in a modern information system. The key is that the vulnerability is documented, confirmed, and publicly reported to be included in the CVE program. This way, security teams can assess risks across the entire infrastructure.
#CVE #IoT