Critical Threat Intelligence & Advisory Summaries

Diagram illustrating CVSS severity scoring compared with EPSS exploit probability in vulnerability prioritisation workflows
Featured

CVSS vs EPSS: How to Prioritise Vulnerabilities by Real Exploitation Risk

Executive Summary

 

Most vulnerability remediation programmes still prioritise patching based on CVSS severity ratings. However, severity alone does not indicate which vulnerabilities attackers are most likely to exploit.

 

CVSS measures theoretical impact under defined conditions. EPSS estimates real-world exploitation probability.[1][2]

 

As annual CVE volume continues to rise, organisations face a prioritisation overload problem: a growing number of vulnerabilities are classified as High or Critical, while remediation capacity remains limited.[3]

 

The result is a structural mismatch. Security teams spend effort patching vulnerabilities unlikely to be exploited, while adversaries focus on a much smaller subset of actively targeted flaws.

 

Effective vulnerability management requires combining

๐Ÿ”ธ CVSS severity

๐Ÿ”ธ EPSS exploitation probability

๐Ÿ”ธ CISA KEV intelligence

๐Ÿ”ธ asset criticality

๐Ÿ”ธ exposure context

 

Threat Overview: Where CVSS Alone Falls Short

 

CVSS (Common Vulnerability Scoring System) provides standardised severity ratings from 0–10.

 

It is designed to answer:

๐Ÿ”ธ If exploited successfully, how severe could impact be?

 

This differs fundamentally from:

๐Ÿ”ธ How likely is exploitation in the real world?

 

A CVSS base score does not automatically change when:

๐Ÿ”ธ proof-of-concept exploit code is released,

๐Ÿ”ธ ransomware groups adopt a vulnerability,

๐Ÿ”ธ exploitation campaigns begin at scale.[4]

 

This creates a major operational limitation.

 

A CVE scored Medium may become actively exploited within days, while many Critical vulnerabilities never experience meaningful attacker interest. In 2024, the National Vulnerability Database recorded more than 40,000 published CVEs, continuing the multi-year acceleration trend.[3]. For most teams, patching every High/Critical CVE within compliance windows is no longer realistic.

 

EPSS - Exploitation Probability as a Prioritisation Signal

 

EPSS (Exploit Prediction Scoring System), maintained by FIRST, estimates the likelihood that a CVE will be exploited within 30 days.[1]

 

Scores range from:

๐Ÿ”ธ 0.0 = very low probability

๐Ÿ”ธ 1.0 = very high probability

 

Unlike CVSS, EPSS updates daily.

 

The model evaluates over 1,100 signals, including:

๐Ÿ”ธ exploit publication activity

๐Ÿ”ธ attacker behaviour patterns

๐Ÿ”ธ vulnerability age

๐Ÿ”ธ software prevalence

๐Ÿ”ธ historical exploitation data.[2]

 

EPSS answers:

๐Ÿ”ธ Which vulnerabilities should we expect attackers to target next?

 

EPSS provides value for:

๐Ÿ”ธ remediation triage

๐Ÿ”ธ patch SLA tuning

๐Ÿ”ธ threat-led prioritisation queues

 

Efficiency vs Coverage: Understanding the Trade-Off

 

EPSS improves prioritisation by helping teams focus remediation effort on vulnerabilities that are more likely to be exploited, however, this introduces an important operational trade-off between efficiency and coverage.

 

๐Ÿ”ธEfficiency = how much of your remediation effort is spent on vulnerabilities that attackers actually exploit

๐Ÿ”ธCoverage = how many of the eventually exploited vulnerabilities you successfully remediate

 

In operational terms:

๐Ÿ”ธHigher EPSS thresholds
     → fewer vulnerabilities are prioritised
     → remediation effort becomes more focused
     → but some exploitable vulnerabilities may be missed

๐Ÿ”ธLower EPSS thresholds
     → more vulnerabilities are included
     → greater chance of covering all exploitable issues
     → but with increased remediation workload

 

This reflects a real-world constraint:  "security teams cannot remediate everything, they must decide where to focus limited capacity".

 

 There is no universal “correct” EPSS threshold. Effective use depends on:

๐Ÿ”ธ organisational risk tolerance
๐Ÿ”ธ available remediation capacity
๐Ÿ”ธ criticality of affected systems

 

For example:

๐Ÿ”ธorganisations with limited patch capacity may prioritise only the highest EPSS vulnerabilities

๐Ÿ”ธorganisations protecting critical infrastructure may accept lower thresholds to maximise coverage

 

Key point:  EPSS does not eliminate prioritisation decisions, it makes those decisions more informed by attacker behaviour.

 

 

How Prioritisation Failures Enable Exploitation

 

The following examples illustrate how prioritisation failures translate into real-world exploitation outcomes.


Case Study 1 : Citrix Bleed (CVE-2023-4966)

Citrix Bleed affected NetScaler ADC and Gateway devices and became widely exploited following disclosure. CISA added CVE-2023-4966 to the Known Exploited Vulnerabilities catalogue after confirmed in-the-wild abuse.[5]

 

Initial CVSS scoring indicated severity, but urgency escalated because:

๐Ÿ”ธ exploitation rapidly appeared in ransomware operations,

๐Ÿ”ธ session token theft enabled credential bypass,

๐Ÿ”ธ exposed internet-facing systems became immediate targets.[5][6]

 

Many organisations delayed remediation because:

๐Ÿ”ธ patch queues were saturated with other High CVSS vulnerabilities,

๐Ÿ”ธ static severity scoring did not distinguish immediate exploit urgency.

 

๐Ÿ”ถ Operational lesson: CVSS indicated seriousness; exploitation intelligence defined urgency.

 

Case Study 2 :  Ivanti Connect Secure Exploitation (CVE-2023-46805 / CVE-2024-21887)

Ivanti edge appliances became a major exploitation target in early 2024.

 

CISA confirmed active exploitation in the wild, where attackers chained authentication bypass and command injection flaws to gain persistent access to perimeter devices.[7]

 

These vulnerabilities rapidly entered:

๐Ÿ”ธ CISA KEV catalogues,

๐Ÿ”ธ incident response escalations,

๐Ÿ”ธ emergency remediation cycles.[5][7]

 

Organisations relying only on static CVSS prioritisation often responded too slowly because:

๐Ÿ”ธ edge appliance exposure amplified attacker value,

๐Ÿ”ธ exploitation accelerated before standard patch windows closed.

 

๐Ÿ”ถ Operational lesson: Exposure context and exploitation probability must override static severity queues.

 

Operational Challenges for SOC and Security Teams

 

The detection challenge: Security teams that rely only on CVSS scores consistently encounter the same operational challenges, making it harder to accurately detect and respond to real threats:

 

๐Ÿ”ธ Resource Allocation Distortion: Too many vulnerabilities appear equally urgent.

๐Ÿ”ธ Exploitation Timing Blindness: CVSS does not reflect whether attackers are actively attacking a vulnerability.

๐Ÿ”ธ Environmental Context Gaps: CVSS does not account for:

- internet exposure,

- crown-jewel assets,

- privilege adjacency.

๐Ÿ”ธ Edge Device Risk Underestimation: Internet-facing infrastructure often becomes attacker priority regardless of CVSS rank.

 

 

Why Existing Controls Fail


Patch Velocity Constraints

Modern environments cannot safely apply patches at the speed vulnerability volume demands.

 

In 2024, more than 40,000 CVEs were published, with a significant proportion classified as High or Critical severity.[3]

 

However, patching is not a simple or instantaneous process. For production systems, remediation typically requires:

๐Ÿ”ธ validating whether the vulnerability is present and exploitable in the environment

๐Ÿ”ธ testing patches in staging environments to avoid service disruption

๐Ÿ”ธ assessing impact on dependent applications and integrations

๐Ÿ”ธ scheduling maintenance windows

๐Ÿ”ธ deploying changes in a controlled rollout

๐Ÿ”ธ performing post-deployment validation and rollback planning

 

For critical systems, services, and customer-facing platforms, untested patching introduces risk of outage, data corruption, or business disruption.

 

As a result, security and operations teams must triage and sequence remediation work rather than apply updates immediately across all systems.

 

This creates a fundamental constraint: remediation capacity is limited, while vulnerability volume continues to increase.

 

Critical Overload

When a large proportion of vulnerabilities are labelled High or Critical, severity-based prioritisation loses practical meaning.

 

If half or more of identified vulnerabilities require urgent remediation by policy, teams cannot realistically address all of them within required timeframes.

 

This leads to:

๐Ÿ”ธ patch queues containing hundreds or thousands of “urgent” items

๐Ÿ”ธ no clear distinction between actively exploited vulnerabilities and theoretical risks

๐Ÿ”ธ delayed remediation for vulnerabilities that attackers are actually targeting

 

Without additional context such as exploitation likelihood or exposure, all High/Critical vulnerabilities appear equally important even when they are not.

 

Compliance Distortion

Many regulatory and compliance frameworks define remediation timelines based on CVSS severity thresholds.

 

While this provides standardisation, it also introduces unintended consequences:

๐Ÿ”ธ teams prioritise vulnerabilities to meet audit requirements rather than reduce real-world risk

๐Ÿ”ธ remediation decisions are driven by severity labels instead of attacker activity

๐Ÿ”ธ vulnerabilities with low exploitation likelihood may be prioritised ahead of actively targeted flaws

 

This creates a misalignment between what organisations are measured on (compliance) and what attackers actually exploit (opportunity).

 

 

Risk Exposure Scenarios

 

Scenario 1 : Medium CVSS, High EPSS

A vulnerability is assigned a Medium CVSS score due to limited theoretical impact or required conditions for exploitation.

 

However, exploit code becomes publicly available, and threat actors begin actively targeting it causing its EPSS score to rise rapidly.

 

In practice, this often occurs in:

๐Ÿ”ธ internet-facing applications

๐Ÿ”ธ widely deployed software

๐Ÿ”ธ authentication or session-handling components

 

Because it is not classified as High or Critical, the vulnerability is placed lower in the patch queue.

 

While remediation is delayed:

๐Ÿ”ธ attackers scan for exposed systems

๐Ÿ”ธ automated exploitation begins

๐Ÿ”ธ initial access is established before patch deployment

 

Outcome: A vulnerability considered “moderate” in severity becomes a primary entry point for compromise.

What went wrong: Severity was prioritised over exploitation likelihood.

How EPSS helps: A rising EPSS score flags the vulnerability as operationally urgent, even when CVSS does not.

 

 

Scenario 2 : High CVSS, Low EPSS

A vulnerability receives a High CVSS score due to significant theoretical impact, such as privilege escalation or remote code execution.

 

However, exploitation requires:

๐Ÿ”ธ local access

๐Ÿ”ธ complex preconditions

๐Ÿ”ธ uncommon configurations

 

As a result, the likelihood of real-world exploitation remains low, reflected in a low EPSS score.

 

Despite this, CVSS-based policies force prioritisation:

๐Ÿ”ธ patching is scheduled urgently

๐Ÿ”ธ engineering resources are allocated

๐Ÿ”ธ change windows are consumed

 

This often delays remediation of other vulnerabilities that are:

๐Ÿ”ธ easier to exploit

๐Ÿ”ธ actively targeted

๐Ÿ”ธ externally exposed

 

Outcome: Security effort is consumed addressing low-probability risk while higher-probability attack paths remain open.

What went wrong: Theoretical impact was treated as immediate risk.

How EPSS helps: EPSS allows teams to deprioritise low-likelihood vulnerabilities without ignoring them, freeing capacity for higher-risk issues.

 

Scenario 3 :  Zero-Day Active Exploitation

A previously unknown vulnerability is exploited in the wild before:

๐Ÿ”ธ a CVE is formally published

๐Ÿ”ธ a CVSS score is assigned

๐Ÿ”ธ EPSS models accumulate sufficient data

 

This commonly occurs in:

๐Ÿ”ธ edge devices (VPNs, firewalls, gateways)

๐Ÿ”ธ widely deployed enterprise software

๐Ÿ”ธ identity and access infrastructure

 

Organisations relying only on vulnerability scanning and CVSS-based prioritisation have no visibility of the risk.

 

Detection typically occurs only after:

๐Ÿ”ธ suspicious activity is observed

๐Ÿ”ธ threat intelligence alerts are issued

๐Ÿ”ธ CISA adds the vulnerability to the KEV catalogue

 

Outcome: Attackers gain early access during the window between exploitation and formal vulnerability classification.

What went wrong: No integration with real-time threat intelligence.

How EPSS fits: EPSS is not designed for zero-day detection, but complements KEV and threat intelligence once exploitation patterns emerge.

 

Key Takeaway

Across all scenarios, the failure is consistent, prioritisation decisions are made using static severity rather than dynamic attacker behaviour.

 

Effective vulnerability management requires combining:

๐Ÿ”ธ CVSS (impact)

๐Ÿ”ธ EPSS (likelihood)

๐Ÿ”ธ KEV and threat intelligence (confirmed exploitation)

๐Ÿ”ธ exposure context (where the vulnerability exists)

 

Without this combination, teams systematically:

๐Ÿ”ธ over-prioritise theoretical risk

๐Ÿ”ธ under-prioritise active threats

 

Why Security Tools Don’t Solve Prioritisation

 

Modern security programmes deploy multiple tools to identify and monitor risk, including vulnerability scanners, SIEM platforms, EDR solutions, and periodic testing such as penetration tests or audits  however, these tools provide partial visibility, not prioritisation.  Each answers a different question but none in isolation, answers:

๐Ÿ”ธ Which vulnerabilities should we fix first based on real attacker behaviour?

 

 

Vulnerability Scanners (VA Tools)

Vulnerability scanners identify known CVEs across systems and typically rank them by CVSS severity.

 

They are effective at:

๐Ÿ”ธ discovering vulnerabilities at scale

๐Ÿ”ธ providing asset-level visibility

๐Ÿ”ธ supporting compliance reporting

 

However, they do not:

๐Ÿ”ธ indicate whether a vulnerability is actively being exploited

๐Ÿ”ธ distinguish between theoretical and likely attack paths

๐Ÿ”ธ account for real-time threat activity

 

Limitation: They generate large volumes of findings, but offer limited guidance on which ones represent immediate operational risk.

 

SIEM Platforms

SIEM systems aggregate logs and detect suspicious activity across environments.

 

They are effective at:

๐Ÿ”ธ identifying indicators of compromise

๐Ÿ”ธ correlating events across systems

๐Ÿ”ธ supporting incident investigation

 

However, they operate primarily:after attacker activity has begun

 

Limitation: SIEM detects exploitation attempts or breaches in progress, but does not help prioritise vulnerabilities before they are exploited.

 

 

EDR / XDR Solutions

Endpoint detection tools monitor system behaviour and detect malicious activity on endpoints.

 

They are effective at:

๐Ÿ”ธ detecting post-exploitation behaviour

๐Ÿ”ธ identifying malware and lateral movement

๐Ÿ”ธ enabling response actions

 

However:

๐Ÿ”ธ exploitation of unpatched vulnerabilities may appear as legitimate application behaviour initially

๐Ÿ”ธ detection often occurs only after compromise has begun

 

Limitation: EDR reduces impact, but does not prevent prioritisation failures.

 

Penetration Testing and Audits

Penetration tests and security audits provide point-in-time assessments of security posture.

 

They are effective at:

๐Ÿ”ธ identifying exploitable weaknesses

๐Ÿ”ธ validating security controls

๐Ÿ”ธ demonstrating real-world attack paths

 

However:

๐Ÿ”ธ they are periodic, not continuous

๐Ÿ”ธ they cover limited scope at a specific moment in time

๐Ÿ”ธ they do not scale to the full vulnerability landscape

 

Limitation: They highlight risk, but do not provide ongoing prioritisation across thousands of vulnerabilities. Its a point in time 'opinion' that could be invalidated minutes after findings are recorded, also note, security professionals treat vulnerabilities discovered this way with a completely different remediation approach ignoring SLAs.

 

The Core Problem

Each of these tools answers a different question:

๐Ÿ”ธ Vulnerability scanners → What vulnerabilities exist?

๐Ÿ”ธ SIEM / EDR → Is something malicious happening now?

๐Ÿ”ธ Pen testing → What could be exploited in this environment?

 

None of them answers: What are attackers most likely to exploit next across our entire environment?

 

Closing the Gap

Effective vulnerability prioritisation requires combining multiple signals:

๐Ÿ”ธ CVSS → impact severity

๐Ÿ”ธ EPSS → exploitation likelihood

๐Ÿ”ธ KEV → confirmed active exploitation

๐Ÿ”ธ Exposure context → where the vulnerability exists (e.g. internet-facing, critical systems)

 

This combination enables teams to move from:

 

"visibility of risk" to "prioritisation of real-world attack paths"

 

 

How to Integrate EPSS into Vulnerability Workflows

 

The following recommendations directly address the gaps identified in exploitation-aware prioritisation. Each action aligns to a specific stage in the vulnerability management lifecycle where EPSS should influence decision-making.

 

1๏ธโƒฃ Integrate EPSS at Intake and Triage

 

Addresses: Initial CVE assessment performed using CVSS only

 

Action:

๐Ÿ”ธ Ingest EPSS scores alongside vulnerability scan results
๐Ÿ”ธ Enrich CVE data automatically during intake
๐Ÿ”ธ Flag vulnerabilities above defined EPSS thresholds at point of entry

 

Outcome: High-probability vulnerabilities are identified early and enter the remediation queue with appropriate priority.

 

 

2๏ธโƒฃ Implement Dual-Scoring Prioritisation

 

Addresses: Static prioritisation based on CVSS thresholds

 

Action:

๐Ÿ”ธ Combine: CVSS (impact severity) + EPSS (exploitation likelihood)[1][2]
๐Ÿ”ธ Define prioritisation rules that elevate vulnerabilities with high EPSS scores, regardless of CVSS rating

 

Outcome: Remediation effort aligns more closely with real-world attacker behaviour rather than theoretical severity.

 

 

3๏ธโƒฃ Enable Continuous Re-Prioritisation

 

AddressesNo adjustment when exploitation likelihood changes

 

Action:

๐Ÿ”ธ Monitor EPSS score updates daily
๐Ÿ”ธ Trigger reclassification when:

- EPSS crosses defined thresholds

- significant score increases occur over short periods

๐Ÿ”ธ Integrate alerts into vulnerability management or SIEM workflows

 

Outcome: Vulnerabilities are re-prioritised as threat conditions evolve, reducing exposure to emerging exploitation.

 

 

4๏ธโƒฃ Introduce Fast-Track Remediation for High-Risk Vulnerabilities

 

AddressesStandard patch cycles applied regardless of exploitation risk

 

Action:

๐Ÿ”ธ Define accelerated SLAs for:

- high EPSS vulnerabilities

- KEV-listed vulnerabilities

- internet-facing assets

๐Ÿ”ธ Enable out-of-band patching or compensating controls where required

 

Outcome: Actively targeted vulnerabilities are remediated faster than standard patch cycles allow.

 

 

5๏ธโƒฃ Require EPSS Review in Risk Acceptance Decisions

 

Addresses: Exceptions granted without considering exploitation likelihood

Action:

๐Ÿ”ธ Include EPSS score and percentile in risk acceptance workflows
๐Ÿ”ธ Require justification for accepting vulnerabilities with elevated EPSS scores
๐Ÿ”ธ Document exploitation risk alongside business impact

 

Outcome: Risk acceptance decisions reflect both impact and likelihood, reducing blind acceptance of exploitable vulnerabilities.

 

 

6๏ธโƒฃ Correlate EPSS with KEV and Threat Intelligence

 

AddressesDisconnected use of exploitation signals

Action:

๐Ÿ”ธ Cross-reference vulnerabilities against:

- CISA KEV catalogue

- EPSS scores

๐Ÿ”ธ Prioritise vulnerabilities where:

- EPSS is high (emerging risk)

- KEV confirms active exploitation

 

Outcome: Teams gain both predictive and confirmed exploitation visibility, improving prioritisation accuracy.

 

7๏ธโƒฃ Apply Exposure-Based Weighting

 

Addresses: Lack of prioritisation based on where vulnerabilities exist

 

Action: Adjust prioritisation based on asset exposure:

๐Ÿ”ธ internet-facing systems
๐Ÿ”ธ externally accessible services
๐Ÿ”ธ identity and authentication systems
๐Ÿ”ธ edge infrastructure (VPNs, gateways, firewalls)

 

Outcome: Reflects real attacker targeting behaviour, where accessible systems are prioritised first.

 

8๏ธโƒฃ Build Adaptive SLA Tiers

 

Addresses: Static remediation timelines based only on CVSS severity

 

Action: Implement risk-based SLAs combining EPSS, KEV, and exposure:

 

Tier Criteria Recommended SLA
Tier 1 High EPSS + KEV + Internet-Facing 72 hours
Tier 2 High EPSS + Critical Asset 7 days
Tier 3 Medium EPSS + High CVSS 14 days
Tier 4 Low EPSS + Low Exposure Risk-based

 

Outcome: Aligns remediation timelines with real-world attack likelihood and impact.

 

 Implementation Summary

 

Vulnerability Management Stage Traditional Approach Exploitation-Aware Approach
Triage CVSS-only classification CVSS + EPSS at intake
Prioritisation Static severity thresholds Dynamic scoring (CVSS + EPSS + KEV)
Monitoring Periodic review Continuous EPSS updates
Remediation Fixed SLA by severity Risk-based SLA (EPSS + exposure)

 

 

Implementation Note

 

EPSS does not replace CVSS or threat intelligence. It provides an additional signal, exploitation likelihood, that must be combined with:

๐Ÿ”ธ asset criticality
๐Ÿ”ธ exposure (e.g. internet-facing systems)
๐Ÿ”ธ business context

 

There is no universal EPSS threshold. Organisations should calibrate thresholds based on risk tolerance and remediation capacity.[2]

 

Key Takeaway

Effective vulnerability prioritisation requires integrating EPSS at multiple decision points not as a standalone score, but as part of a continuous, risk-based workflow.

 

 

Summary

 

The volume of disclosed vulnerabilities continues to rise faster than remediation capacity.[3] This makes severity-led patching increasingly ineffective.

EPSS introduces exploitation forecasting into vulnerability management, shifting patching from:

 

โŒ severity-led compliance activity  

to  

โœ… risk-led operational defence  

 

CVSS remains essential, but it answers only one part of the risk question: impact severity.

 

EPSS adds the missing dimension - likelihood of attacker action.

 

Modern vulnerability programmes should treat CVSS as impact context, not patch priority alone. The most effective models combine:

๐Ÿ”ธ  CVSS

๐Ÿ”ธ EPSS

๐Ÿ”ธ KEV

๐Ÿ”ธ threat intelligence

๐Ÿ”ธ asset exposure

๐Ÿ”ธ business criticality

 

This is the shift from theoretical severity management to real-world exploitation defence.

 

 

Strategic Context & Further Reading

 

 

๐Ÿ”— Vulnerability Management Reality: Operational Risk & Exposure-Based Prioritization
Why read this: Understand why traditional vulnerability management models fail at scale and how exposure-based prioritization changes remediation strategy.

 

๐Ÿ”— Operational Threat Intelligence: Practical Guide for Security Teams
Why read this: Learn how to integrate real-time threat intelligence into vulnerability prioritization and move from reactive patching to intelligence-led defense.

 

 

 

 


About This Report

 

Reading Time: Approximately 15 minutes

 

Attribution Note

This analysis is based on publicly available reporting and security research summaries. Some technical details may change as additional information becomes available.

 

Author Information

Timur Mehmet | Founder & Lead Editor

Timur is a veteran Information Security professional with a career spanning over three decades. Since the 1990s, he has led security initiatives across high-stakes sectors, including Finance, Telecommunications, Media, and Energy. Professional qualifications over the years have included CISSP, ISO27000 Auditor, ITIL and technologies such as Networking, Operating Systems, PKI, Firewalls. For more information including independent citations and credentials, visit our About page.

Contact: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Editorial Standards

This article adheres to Hackerstorm.com's commitment to accuracy, independence, and transparency:

  • Fact-Checking: All statistics and claims are verified against primary sources and authoritative reports
  • Source Transparency: Original research sources and citations are provided in the References section below
  • No Conflicts of Interest: This analysis is independent and not sponsored by any vendor or organization
  • Corrections Policy: We correct errors promptly and transparently. Report inaccuracies to This email address is being protected from spambots. You need JavaScript enabled to view it.

Editorial Policy: Ethics, Non-Bias, Fact Checking and Corrections


Learn More: About Hackerstorm.com | FAQs

 

Source Transparency

 

Primary Standards and Methodology Sources

[1] FIRST.org - Exploit Prediction Scoring System (EPSS) Overview
https://www.first.org/epss/

[2] FIRST.org - EPSS Model Documentation
https://www.first.org/epss/model

[3] National Vulnerability Database (NVD) - Vulnerability Metrics and CVE Data
https://nvd.nist.gov/

[4] NIST NVD - CVSS Vulnerability Metrics Documentation
https://nvd.nist.gov/vuln-metrics/cvss

 

Active Exploitation Intelligence Sources

[5] CISA Known Exploited Vulnerabilities (KEV) Catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog

[6] Citrix Security Bulletin - CVE-2023-4966 (Citrix Bleed) Advisory
https://support.citrix.com/article/CTX579459

[7] CISA Cybersecurity Advisory AA24-060B - Ivanti Connect Secure Exploitation
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b

 

Supporting Threat Research

[8] FIRST EPSS Research Paper (ACM Digital Library)
https://dl.acm.org/doi/10.1145/3436242

[9] Volexity Threat Research - Ivanti Exploitation Analysis
https://www.volexity.com/

[10] Ivanti Security Advisory - CVE-2023-46805 / CVE-2024-21887
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-Gateways?language=en_US

By using this site, you agree to our Terms & Conditions.

COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.

Terms & Privacy Policy