Strategic Recommendation for Transitioning from CVSS to Risk-Based Vulnerability Prioritization4/3/2025
Many organizations have traditionally referred to CVSS scores to prioritize vulnerability mitigation. However, there is now a growing need to adopt a risk-based approach. In this blog, we will explore the reasons behind this shift, the metrics that should be used for prioritization, and the key points for transitioning to a risk-based approach. Table of Contents 1. The Increasing Number of Vulnerabilities and Evolving Paradigms in Vulnerability Management 2. Two Major Misconceptions About Vulnerabilities 3. The Importance of "Proof of Concept" (PoC) and "In The Wild" (ITW) 4. Considering the integrity of vulnerable assets 5. Emerging Trends: SSVC, CVSS 4.0, and EPSS 1. The Increasing Number of Vulnerabilities and Evolving Paradigms in Vulnerability Management Traditionally, many organizations have relied on CVSS (Common Vulnerability Scoring System) scores to prioritize vulnerability management. Organizations typically addressed vulnerabilities with a score of 7 or higher, or aimed to patch all reported vulnerabilities whenever possible. This approach was feasible when the number of vulnerabilities was relatively low. The urgency around vulnerability management increased significantly around 2014 due to prominent vulnerabilities such as Heartbleed in OpenSSL and Shell Shock in Bash, both of which allowed for easy exploitation from remote locations. These events highlighted the importance of vulnerability management and the need for timely patching. For a few years following these incidents, the number of vulnerabilities remained manageable, allowing organizations to maintain their strategy of addressing all vulnerabilities. However, around 2017, the number of vulnerabilities began to rise exponentially. By 2019, the threat posed by ransomware had become severe. Vulnerabilities that were not addressed could lead to critical incidents, and the growing volume made it challenging for many organizations to keep up. Many of the vulnerability management practices based on CVSS were established between 2014 and 2016. However, It is clear that the situation has significantly changed since then, as demonstrated by the increase in both the number and the growth rate of vulnerabilities. In response to these changes, the standard approach to vulnerability management is evolving. Rather than attempting to address all vulnerabilities or prioritizing solely based on a CVSS score of 7 or higher, the focus is shifting toward prioritizing "high-risk vulnerabilities." This approach involves considering the location and business value of the assets, and utilizing specialized solutions to effectively manage the limited resources available. 2. Two Major Misconceptions About Vulnerabilities Before discussing what constitutes a "high-risk vulnerability" that should be prioritized, it is important to address two common misconceptions about vulnerabilities. Misconception 1: All risks are inherently dangerous and should be addressed. Nearly 30,000 vulnerabilities are published annually. However, many of these vulnerabilities have not been publicly proven to be exploitable. Only a small fraction of vulnerabilities pose a real-world risk and have the means to be exploited. Exploitable vulnerabilities can be categorized into various risk levels, ranging from those with documented attack methods and proof-of-concept (PoC) code to those that can be successfully exploited under specific conditions. Although rarely, some vulnerabilities allow easy attacks by any threat actor, most remain theoretical. Studies from various research organizations suggest that only about 3% of disclosed vulnerabilities pose real-world risks. Of the nearly 30,000 vulnerabilities disclosed each year, only about 3% require urgent attention. Most other vulnerabilities are unlikely to be realistically exploited, reducing the need for immediate mitigation. This reflects the current approach to vulnerability management. If sufficient resources were available to address all vulnerabilities, the situation would be different. However, given the substantial workload faced by those responsible, it is crucial to prioritize responses to realistic risks while optimizing resource allocation. Misconception 2: CVSS scores are an effective indicator for determining which vulnerabilities to address. Another common misconception is that CVSS scores effectively differentiate between vulnerabilities that need attention and those that do not. Many organizations use a CVSS score of 7 as a threshold for action. However, a white paper published in 2018 from the organizations that develop CVSS states that using CVSS scores for prioritization is a misuse. CVSS scores indicate the theoretical severity of vulnerabilities rather than their real-world risk. Historically, over half of all vulnerabilities have CVSS scores above 7. Prioritizing based on CVSS leads to almost all vulnerabilities requiring urgent attention, which is impractical. Conversely, some high-risk vulnerabilities with scores below 7 may be exploited in attacks and thus could be overlooked using this method. The concept of prioritizing high-risk vulnerabilities is exemplified by the launch of the Known Exploited Vulnerabilities (KEV) catalog by the Cybersecurity and Infrastructure Security Agency (CISA) in 2021. As a key agency promoting cybersecurity measures across the U.S. federal government, CISA implemented a significant shift in its vulnerability response approach in 2021. Instead of addressing all vulnerabilities, the revised policy now focuses on vulnerabilities that are actively exploited, which represent 3% of the total, as previously mentioned. The KEV catalog, maintained by CISA, lists vulnerabilities known to have been exploited. From 2021, this catalog became the primary reference for prioritizing vulnerabilities, with a legal mandate for federal agencies to address listed vulnerabilities typically within three weeks. CISA's adoption of this focused approach underscores its importance as a shift in vulnerability management strategy in a leading cybersecurity nation. 3. The Importance of "Proof of Concept" (PoC) and "In The Wild" (ITW) When evaluating vulnerability information disseminated by web media and other sources, it is crucial to focus on certain key information. Two significant keywords to note are "PoC" and "ITW." PoC, or Proof of Concept, involves detailed explanatory information regarding the existence and potential exploitation of a vulnerability. It refers to the steps necessary to actually manifest the vulnerability. There is a significant gap in risk between the public announcement of a vulnerability and the release of a PoC. Once a PoC is available, it provides information on how the vulnerability can be exploited, greatly increasing the risk of it being used in attack activities. Therefore, it requires careful attention. ITW, which stands for "exploit in the wild," refers to actual attack activities that have been observed using the vulnerability. This term is already commonly used as an idiomatic expression in the English-speaking countries. Even if a PoC exists, exploiting the vulnerability might require tricking a system administrator into specific actions, or the necessary settings for exploiting the vulnerability might not be enabled by default, making real-world exploitation impractical in many cases. However, when information indicating ITW is released by vendors or the media, it means the vulnerability has already been exploited in real attacks, necessitating maximum caution and prompt response. 4. Considering the integrity of vulnerable assets In addition to prioritizing realistic risks, there is a growing recognition that the nature of the assets containing the vulnerabilities should also be considered when addressing vulnerabilities. For example, if a server with vulnerabilities is directly accessible from the internet, attackers can access it at any time, making it highly risky. In contrast, if the server is accessible only from within the organization, the risk is lower because attackers would need to infiltrate the organization's internal network first. If the device operates in a standalone mode and is not connected to any network, the risk of attack is almost negligible. Additionally, the business value of the assets must be considered. For instance, whether the asset holds critical business information, personal data, or if it is just a test server significantly affects the risk evaluation. Prioritizing vulnerability mitigation should account for the nature of the asset. 5. Emerging Trends: SSVC, CVSS 4.0, and EPSS Three significant keywords have emerged in recent years in response to the trends discussed earlier: "SSVC," "CVSS 4.0," and "EPSS." Let’s take a closer look at each.
Note: As of the latest SSVC version 2.1 at the time of this article’s publication, the “Utility” decision point has been replaced by “Automatable.”
In conclusion, risk-based prioritization is becoming a major trend in vulnerability management. As keywords such as SSVC and EPSS gain attention, organizations still reliant solely on CVSS for prioritization should consider transitioning to a risk-based approach to address challenges in vulnerability management effectively. If you are interested in more details, please feel free to contact us. SOURCE Comments are closed.
|