{"id":25620,"date":"2024-12-30T09:20:54","date_gmt":"2024-12-30T17:20:54","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/12\/30\/news-19348\/"},"modified":"2024-12-30T09:20:54","modified_gmt":"2024-12-30T17:20:54","slug":"news-19348","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/12\/30\/news-19348\/","title":{"rendered":"Prioritizing patching: A deep dive into frameworks and tools &#8211; Part 2: Alternative frameworks"},"content":{"rendered":"<p><strong>Credit to Author: Matt Wixey| Date: Mon, 30 Dec 2024 15:05:30 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/12\/27\/prioritizing-patching-a-deep-dive-into-frameworks-and-tools-part-1-cvss\/\" target=\"_blank\" rel=\"noopener\">In the first part of this series<\/a>, we took a close look at CVSS and how it works, concluding that while CVSS may offer some benefits, it\u2019s not designed to be used as a sole means of prioritization. In this article, we\u2019ll cover some alternative tools and systems for remediation prioritization, how they can be used, and their pros and cons.<\/p>\n<h1>Exploit Prediction Scoring System (EPSS)<\/h1>\n<p>EPSS, first published at <a href=\"https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Roytman-Jacobs-Predictive-Vulnerability-Scoring-System.pdf\" target=\"_blank\" rel=\"noopener\">Black Hat USA 2019<\/a>, is (like CVSS) maintained by a <a href=\"https:\/\/www.first.org\/epss\/\" target=\"_blank\" rel=\"noopener\">FIRST Special Interest Group<\/a> (SIG). As noted in <a href=\"https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Roytman-Predictive-Vulnerability-Scoring-System-wp.pdf\" target=\"_blank\" rel=\"noopener\">the whitepaper<\/a> that accompanied the Black Hat talk, the creators of EPSS aim to fill a gap in the CVSS framework: predicting the probability of exploitation based on historic data.<\/p>\n<p>The original version of EPSS used logistic regression: a statistical technique to measure the probability of a binary outcome by considering the contribution several independent variables make to that outcome. For instance, if I wanted to use logistic regression to measure the probability of a yes\/no event occurring (say, whether a given person will purchase one of my products), I\u2019d look to collect a large sample of historical marketing data for previous customers and would-be customers. My independent variables would be things like age, gender, salary, disposable income, occupation, locale, whether a person already owned a rival product, and so on. The dependent variable would be whether the person bought the product or not.<\/p>\n<p>The logistic regression model would tell me which of those variables make a significant contribution to that outcome, either positive or negative. So, for example, I might find that age &lt; 30 and salary &gt; $50,000 are positively correlated to the outcome, but already owns similar product = true is, unsurprisingly, negatively correlated. By weighing up the contributions to these variables, we can feed new data into the model and get an idea of the probability of any given person wanting to buy the product. It&#8217;s also important to measure the predictive accuracy of logistic regression models (as they may result in false positives or false negatives), which can be achieved with <a href=\"https:\/\/www.statisticshowto.com\/receiver-operating-characteristic-roc-curve\/\" target=\"_blank\" rel=\"noopener\">Receiver Operating Characteristic<\/a> (ROC) curves.<\/p>\n<p>The creators of EPSS analyzed over 25,000 vulnerabilities (2016 \u2013 2018), and extracted 16 independent variables of interest including the affected vendor, whether exploit code existed in the wild (either in Exploit-DB or in exploit frameworks like Metasploit and Canvas), and the number of references in the published CVE entry. These were the independent variables; the dependent variable was whether the vulnerability had actually been exploited in the wild (based on data from Proofpoint, Fortinet, AlienVault, and GreyNoise).<\/p>\n<p>The authors found that the existence of weaponized exploits made the most significant positive contribution to the model, followed by Microsoft being the affected vendor (likely due to the number and popularity of products Microsoft develops and releases, and its history of being targeted by threat actors); the existence of proof-of-concept code; and Adobe being the affected vendor.<\/p>\n<p>Interestingly, the authors also noted some negative correlation, including Google and Apple being the affected vendors. They surmised that this may be due to Google products having many vulnerabilities, of which relatively few were exploited in the wild, and Apple being a closed platform that threat actors haven\u2019t historically targeted. The inherent characteristics of a vulnerability (i.e., the information reflected in a CVSS score) appeared to make little difference to the outcome \u2013 although, as one might expect, remote code execution vulnerabilities were more likely to be exploited compared to, say, local memory corruption bugs.<\/p>\n<p>EPSS was originally implemented in a spreadsheet. It provided an estimate of probability that a given vulnerability would be exploited within the next 12 months. <a href=\"https:\/\/arxiv.org\/abs\/2302.14172\" target=\"_blank\" rel=\"noopener\">Subsequent updates to EPSS<\/a> adopted a centralized architecture with a more sophisticated machine learning model, expanded the feature set (including variables such as public vulnerability lists, Twitter \/ X mentions, incorporation into offensive security tools, correlation of exploitation activity to vendor market share and install base, and the age of the vulnerability), and estimated the probability of exploitation within a 30-day window rather than 12 months.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959093\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-1-1.png\" alt=\"\" width=\"602\" height=\"168\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-1-1.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-1-1.png?resize=300,84 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure 1: A screenshot from the EPSS Data and Statistics page, showing the top EPSS scores from the last 48 hours at the time the image was captured. Note that EPSS doesn\u2019t conclude that many of these CVEs will end up being exploited<\/em><\/p>\n<p>While a <a href=\"https:\/\/www.first.org\/epss\/epss_tools\" target=\"_blank\" rel=\"noopener\">simple online calculator<\/a> is available for v1.0, using the latest version requires either downloading a daily CSV file from the <a href=\"https:\/\/www.first.org\/epss\/data_stats.html\" target=\"_blank\" rel=\"noopener\">EPSS Data and Statistics page<\/a>, or <a href=\"https:\/\/api.first.org\/epss\/\" target=\"_blank\" rel=\"noopener\">using the API<\/a>. EPSS scores are not shown on the National Vulnerability Database (NVD), which favors CVSS scores, but they are available on other vulnerability databases such as <a href=\"https:\/\/vuldb.com\/?kb.epss\" target=\"_blank\" rel=\"noopener\">VulnDB<\/a>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/12\/27\/prioritizing-patching-a-deep-dive-into-frameworks-and-tools-part-1-cvss\/\" target=\"_blank\" rel=\"noopener\">As noted in our previous article in this series<\/a>, CVSS scores have not historically been a reliable predictor of exploitation, so EPSS, in principle, seems like a natural complement &#8212; it tells you about the <em>probability <\/em>of exploitation, whereas CVSS tells you something about the <em>impact<\/em>. As an example, say there\u2019s a bug with a CVSS Base score of 9.8, but an EPSS score of 0.8% (i.e., while severe if it is exploited, the bug is less than 1% likely to be exploited within the next 30 days). On the other hand, another bug might have a much lower CVSS Base score of 6.3, but an EPSS score of 89.9% &#8211; in which case, you might want to prioritize it.<\/p>\n<p>What you shouldn\u2019t do (as the EPSS authors point out) is multiply CVSS scores by EPSS scores. Even though this theoretically gives you a severity * threat value, remember that a CVSS score is an ordinal ranking. EPSS, its creators say, communicates different information from that of CVSS, and the two should be considered together but separately.<\/p>\n<p>So is EPSS the perfect companion to CVSS? Possibly \u2013 like CVSS, it\u2019s free to use, and offers useful insight, but it does come with some caveats.<\/p>\n<h2>What does EPSS actually measure?<\/h2>\n<p>EPSS provides a probability score which indicates the likelihood of a given vulnerability being exploited in general. It does not, and is not intended to, measure the likelihood of your organization being targeted specifically, or the impact of successful exploitation, or any incorporation of an exploit into (for instance) a worm or a ransomware gang\u2019s toolkit. The outcome it predicts is binary (exploitation either occurs or it doesn\u2019t \u2013 although note that it\u2019s actually more nuanced than that: either exploitation occurs <em>or<\/em> <em>we don\u2019t know if it has occurred<\/em>), and so an EPSS score tells you one thing: the probability of exploitation occurring within the next 30 days. On a related note, it\u2019s worth making a note of that time period. EPSS scores should, by design, be recalculated, as they rely on temporal data. A single EPSS score is a snapshot in time, not an immutable metric.<\/p>\n<h2>EPSS is a \u2018pre-threat\u2019 tool<\/h2>\n<p>EPSS is a predictive, proactive system. For any given CVE, assuming the requisite information is available, it will generate a probability that the associated vulnerability will be exploited in the next 30 days. You can then, if you choose to, factor in this probability for prioritization, <em>provided the vulnerability has not already been exploited. <\/em>That is, the system does not provide any meaningful insight if a vulnerability is being actively exploited, because it\u2019s a predictive measure. To go back to our earlier example of logistic regression, there\u2019s little point running your data through my model and trying to sell you my product if you already bought it six weeks ago. This seems obvious, but it\u2019s still worth bearing in mind: for vulnerabilities which have been exploited, EPSS scores cannot add any value to prioritization decisions.<\/p>\n<h2>Lack of transparency<\/h2>\n<p>EPSS has a similar issue to CVSS with regard to transparency, although for a different reason. EPSS is a machine learning model, and the underlying code and data is <a href=\"https:\/\/insights.sei.cmu.edu\/blog\/probably-dont-rely-on-epss-yet\/\" target=\"_blank\" rel=\"noopener\">not available to most members of the FIRST SIG<\/a>, let alone the general public. While the maintainers of EPSS say that \u201c<a href=\"https:\/\/www.first.org\/epss\/faq\" target=\"_blank\" rel=\"noopener\">improving transparency is one of our goals,<\/a>\u201d they also note that they cannot share data because \u201cwe have several commercial partners who requested that we not share as part of the data agreement. As far as the model and code, there are many complicated aspects to the infrastructure in place to support EPSS.\u201d<\/p>\n<h2>Assumptions and constraints<\/h2>\n<p>Jonathan Spring, a researcher at Carnegie Mellon University\u2019s Software Engineering Institute, <a href=\"https:\/\/insights.sei.cmu.edu\/blog\/probably-dont-rely-on-epss-yet\/\" target=\"_blank\" rel=\"noopener\">points out<\/a> that EPSS relies on some assumptions which make it less universally applicable than it may appear. EPSS\u2019s website claims that the system estimates \u201cthe likelihood (probability) that a software vulnerability will be exploited in the wild.\u201d However, there are some generalizations here. For example, \u201csoftware vulnerability\u201d refers to a published CVE \u2013 but some software vendors or bug bounty administrators might not use CVEs for prioritization at all. As Spring notes, this may be because a CVE has yet to be published for a particular issue (i.e., a vendor is coordinating with a researcher on a fix, prior to publication), or because the vulnerability is more of a misconfiguration issue, which wouldn\u2019t receive a CVE in any case.<\/p>\n<p>Likewise, \u201cexploited\u201d means exploitation attempts that <a href=\"https:\/\/arxiv.org\/abs\/2302.14172\" target=\"_blank\" rel=\"noopener\">EPSS and its partners were able to observe and record<\/a>, and \u201cin the wild\u201d means the extent of their coverage. The authors of the linked paper also note that, because much of that coverage relies on IDS signatures, there is a bias towards network-based attacks against perimeter devices.<\/p>\n<h2>Numerical outputs<\/h2>\n<p>As with CVSS, EPSS produces a numerical output. And, as with CVSS, users should be aware that risk is not reducible to a single numerical score. The same applies to any attempt to combine CVSS and EPSS scores. Instead, users should take numerical scores into account while maintaining an awareness of context and the systems\u2019 caveats, which should impact how they interpret those scores. And, as with CVSS, EPSS scores are standalone numbers; there are no recommendations or interpretation guidance provided.<\/p>\n<h2>Possible future disadvantages<\/h2>\n<p>The authors of EPSS <a href=\"https:\/\/arxiv.org\/abs\/2302.14172\" target=\"_blank\" rel=\"noopener\">note that attackers may adapt to the system<\/a>. For instance, a threat actor may incorporate lower-scoring vulnerabilities into their arsenal, knowing that some organizations may be less likely to prioritize those vulnerabilities. Given that EPSS uses machine learning, the authors also point out that attackers may in the future attempt to perform adversarial manipulation of EPSS scores, by manipulating input data (such as social media mentions or GitHub repositories) to cause overscoring of certain vulnerabilities.<\/p>\n<h1>Stakeholder-specific Vulnerability Categorization (SSVC)<\/h1>\n<p><a href=\"https:\/\/www.cisa.gov\/stakeholder-specific-vulnerability-categorization-ssvc\" target=\"_blank\" rel=\"noopener\">SSVC<\/a>, created by Carnegie Mellon University&#8217;s Software Engineering Institute (SEI) in collaboration with CISA in 2019, is very dissimilar to CVSS and EPSS in that it does not produce a numerical score as its output at all. Instead, it\u2019s a decision-tree model (in the traditional, logical sense, rather than in a machine learning sense). It aims to fill what its developers see as two major issues with CVSS and EPSS: a) users are not provided with any recommendations or decision points, but are expected to interpret numerical scores themselves; and b) CVSS and EPSS place the vulnerability, rather than the stakeholder, at the center of the equation.<\/p>\n<p>As per <a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2019_019_001_636391.pdf\" target=\"_blank\" rel=\"noopener\">the SSVC whitepaper<\/a>, the framework is intended to enable decisions about prioritization, by following a decision tree along several branches. From a vulnerability management perspective, for example, you start by answering a question about exploitation: whether there\u2019s no activity, a proof-of-concept, or evidence of active exploitation. This leads to decisions about exposure (small, controlled, or open), whether the kill chain is automatable, and \u2018value density\u2019 (the resources that a threat actor would obtain after successful exploitation). Finally, there are two questions on safety impact and mission impact. The \u2018leaves\u2019 of the tree are four possible decision outcomes: <em>defer, scheduled, out-of-cycle,<\/em> or <em>immediate<\/em>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959092\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-2-1.png\" alt=\"\" width=\"602\" height=\"181\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-2-1.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-2-1.png?resize=300,90 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure 2: A sample decision tree from the <\/em><a href=\"https:\/\/certcc.github.io\/SSVC\/ssvc-calc\/\" target=\"_blank\" rel=\"noopener\"><em>SSVC demo site<\/em><\/a><\/p>\n<p>Usefully, the latest version of SSVC also includes several other roles, including patch suppliers, coordinators, and triage\/publish roles (for decisions about triaging and publishing new vulnerabilities), and in these cases the questions and decision outcomes are different. For instance, with coordination triage, the possible outcomes are <em>decline, track,<\/em> and <em>coordinate<\/em>. The labels and weightings are also <a href=\"https:\/\/github.com\/CERTCC\/SSVC\" target=\"_blank\" rel=\"noopener\">designed to be customizable<\/a> depending on an organization\u2019s priorities and sector.<\/p>\n<p>Having gone through the decision tree, you can export a result to either JSON or PDF. The result also includes a vector string, which will be familiar to anyone who read our analysis of CVSS in the previous article. Notably, this vector string contains a timestamp; some SSVC results are intended to be recalculated, depending on the context. The authors of the SSVC whitepaper recommend recalculating scores which depend on the \u2018state of exploitation\u2019 decision point once a day, for example, because this can change rapidly \u2013 whereas other decision points, such as technical impact, should be static.<\/p>\n<p>As the name suggests, SSVC attempts to put stakeholders at the center of the decision by emphasizing stakeholder-specific issues and decision-based outcomes, rather than numerical scores. One useful outcome of this is that you can apply the framework to vulnerabilities without a CVE, or to misconfigurations; another is that stakeholders from disparate sectors and industries can adapt the framework to suit their own needs. It\u2019s also fairly simple to use (you can try it out <a href=\"https:\/\/certcc.github.io\/SSVC\/ssvc-calc\/\" target=\"_blank\" rel=\"noopener\">here<\/a>), once you\u2019ve got a handle on the definitions.<\/p>\n<p>To our knowledge, there hasn\u2019t been any independent empirical research into the effectiveness of SSVC, only a small pilot study conducted by SSVC\u2019s creators. The framework also prefers simplicity over nuance in some respects. CVSS, for example, has a metric for Attack Complexity, but SSVC has no equivalent decision point for ease or frequency of exploitation or anything similar; the decision point is simply whether or not exploitation has occurred and if a proof-of-concept exists.<\/p>\n<p>And, presumably to avoid over-complicating the decision tree, none of the decision points in any of the SSVC trees have an \u2018unknown\u2019 option by default; instead, users are <a href=\"https:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=636379\" target=\"_blank\" rel=\"noopener\">advised<\/a> to make a \u201creasonable assumption\u201d based on prior events. In certain cases, this may skew the eventual decision, particularly with regards to decision points outside an organization\u2019s control (such as whether a vulnerability is being actively exploited); analysts may be uncomfortable with \u2018guessing\u2019 and err on the side of caution.<\/p>\n<p>That being said, it\u2019s perhaps no bad thing that SSVC avoids numerical scores (although some users may see this as a downside), and it has several other factors in its favor: It\u2019s designed to be customizable; is fully open-source; and provides clear recommendations as a final output. As with most of the tools and frameworks we discuss here, a solid approach would be to combine it with others; inputting EPSS and CVSS details (and the KEV Catalog, discussed below), where applicable, into a tailored SSVC decision tree is likely to give you a reasonable indication of which vulnerabilities to prioritize.<\/p>\n<h1>Known Exploited Vulnerabilities (KEV) Catalog<\/h1>\n<p><a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">The KEV Catalog<\/a>, operated by the Cybersecurity and Infrastructure Security Agency (CISA), is a continually updated list of which CVEs threat actors are known to have actively exploited. As of December 2024, there are 1238 vulnerabilities on that list, with provided details including CVE-ID, vendor, product, a short description, an action to be taken (and a due date, which we\u2019ll come to shortly), and a notes field, often containing a link to a vendor advisory.<\/p>\n<p>As per CISA\u2019s <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/binding-operational-directive-22-01\" target=\"_blank\" rel=\"noopener\">Binding Operational Directive 22-01<\/a>, \u201cfederal, executive branch, departments and agencies\u201d are <em>required <\/em>to remediate applicable vulnerabilities in the KEV Catalog, along with some other actions, within a certain timeframe (six months for CVE-IDs assigned before 2021, two weeks for all others). CISA\u2019s justification for creating the KEV Catalog is similar to points we made in our previous article: Only a small minority of vulnerabilities are ever exploited, and attackers do not appear to rely on severity ratings to develop and deploy exploits. Therefore, CISA argues, \u201cknown exploited vulnerabilities should be the top priority for remediation\u2026[r]ather than have agencies focus on thousands of vulnerabilities that may never be used in a real-world attack.\u201d<\/p>\n<p>The KEV Catalog is not updated on a scheduled basis, but within 24 hours of CISA becoming aware of a vulnerability that meets certain criteria:<\/p>\n<ul>\n<li>A CVE-ID exists<\/li>\n<li>\u201cThere is reliable evidence that the vulnerability has been actively exploited in the wild\u201d<\/li>\n<li>\u201cThere is a clear remediation action for the vulnerability\u201d<\/li>\n<\/ul>\n<p>According to CISA, evidence of active exploitation \u2013 whether attempted or successful \u2013 comes from open-source research by its own teams, as well as \u201cinformation directly from security vendors, researchers, and partners\u2026information through US government and international partners\u2026and through third-party subscription services.\u201d Note that scanning activity, or the existence of a proof-of-concept, are not sufficient for a vulnerability to be added to the Catalog.<\/p>\n<p><em>Full disclosure: Sophos is a member of the JCDC, which is the part of CISA that publishes the KEV Catalog<\/em><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959091\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-3.png\" alt=\"\" width=\"602\" height=\"325\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-3.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-3.png?resize=300,162 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure 3: Some of the entries in the KEV Catalog<\/em><\/p>\n<p>While primarily aimed at US federal agencies, <a href=\"https:\/\/cyberscoop.com\/cisa-kev-catalog-must-patch-list\/\" target=\"_blank\" rel=\"noopener\">many private sector organizations have adopted the list<\/a> for prioritization. It\u2019s not hard to see why; the Catalog provides a simple and manageable collection of active threats, in CSV or JSON formats, which can easily be ingested and, as CISA suggests, incorporated into a vulnerability management program for prioritization. Crucially, CISA is clear that organizations should not rely solely on the Catalog, but take other sources of information into account<\/p>\n<p>Like EPSS, the KEV Catalog is predicated on a binary outcome: if a bug is on the list, it\u2019s been exploited. If it\u2019s not, it hasn\u2019t (or, more accurately, we don\u2019t know if it has or not). But <a href=\"https:\/\/www.greynoise.io\/blog\/evaluating-cisa-kev\" target=\"_blank\" rel=\"noopener\">there\u2019s a lot of contextual information KEV doesn\u2019t provide<\/a>, which could aid organizations with prioritization, particularly in the future as the list continues to grow and become more unwieldy (and it will; there is only one reason a vulnerability would ever be removed from the list, which is if a vendor update causes an \u201cunforeseen issue with greater impact than the vulnerability itself\u201d).<\/p>\n<p>For instance, the Catalog does not detail the volume of exploitation. Has a bug been exploited once, or a handful of times, or thousands of times? It doesn\u2019t provide any information about affected sectors or geographies, which could be useful data points for prioritization. It doesn\u2019t tell you what category of threat actor is exploiting the vulnerability (other than ransomware actors), or when the vulnerability was last exploited. As with our discussion of EPSS, there are also issues around what is considered a vulnerability, and the transparency of data. Regarding the former, a KEV Catalog entry must have a CVE \u2013 which may be less useful for some stakeholders \u2013 and regarding the latter, its exploitation coverage is limited to what CISA\u2019s partners can observe, and that data is not available for inspection or corroboration. However, a curated list of vulnerabilities which are believed to have been actively exploited is likely useful for many organizations, and provides additional information on which to base decisions about remediation.<\/p>\n<p>You\u2019re perhaps starting to get a sense of how some of these different tools and frameworks can be combined to give a better understanding of risk, and lead to more informed prioritization. CVSS gives an indication of a vulnerability\u2019s severity based on its inherent characteristics; the KEV Catalog tells you which vulnerabilities threat actors have already exploited; EPSS gives you the probability of threat actors exploiting a vulnerability in the future; and SSVC can help you reach a decision about prioritization by taking some of that information into account within a customized, stakeholder-specific decision-tree.<\/p>\n<p>To some extent, CVSS, EPSS, SSVC, and the KEV Catalog are the \u2018big hitters.\u2019 Let\u2019s now turn to some lesser-known tools and frameworks, and how they stack up. (For clarity, we\u2019re not going to look at schemes like <a href=\"https:\/\/cwe.mitre.org\/\" target=\"_blank\" rel=\"noopener\">CWE<\/a>, <a href=\"https:\/\/cwe.mitre.org\/cwss\/cwss_v1.0.1.html\" target=\"_blank\" rel=\"noopener\">CWSS<\/a>, <a href=\"https:\/\/cwe.mitre.org\/cwraf\/\" target=\"_blank\" rel=\"noopener\">CWRAF<\/a>, and so on, because they\u2019re specific to weaknesses rather than vulnerabilities and prioritization.)<\/p>\n<h1>Other frameworks and tools<\/h1>\n<h2>Vendor-specific schemes<\/h2>\n<p>Several commercial entities offer paid vulnerability ranking services and tools designed to assist with prioritization; some of these may include EPSS-like prediction data generated by proprietary models, or EPSS scores in conjunction with closed-source data. Others use CVSS, perhaps combining scores with their own scoring systems, threat intelligence, vulnerability intelligence, and\/or information about a customer\u2019s assets and infrastructure. While these offerings may provide a more complete picture of risk and a better guide to prioritization compared to, say, CVSS or EPSS alone, they\u2019re not typically publicly available and so aren\u2019t open to evaluation and assessment.<\/p>\n<p>Some product vendors have devised their own systems and make their scores public. Microsoft has two such systems for vulnerabilities in its own products: a <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/security-update-severity-rating-system\" target=\"_blank\" rel=\"noopener\">Security Update Severity Rating System<\/a> which, like CVSS, provides a guide to the severity of a vulnerability (Microsoft states that its ratings are based on \u201cthe worst theoretical outcome were that vulnerability to be exploited\u201d); and the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/exploitability-index\" target=\"_blank\" rel=\"noopener\">Microsoft Exploitability Index<\/a>, which aims to provide an assessment of the likelihood of a vulnerability being exploited. This appears to be based on Microsoft\u2019s analysis of the vulnerability; how difficult it would be to exploit; and past exploitation trends, rather than a statistical model, although not enough information is provided to confirm this.<\/p>\n<p>Red Hat also has a <a href=\"https:\/\/access.redhat.com\/security\/updates\/classification\" target=\"_blank\" rel=\"noopener\">Severity Ratings<\/a> system, comprising four possible ratings along with a calculated CVSS Base score. Like the Microsoft systems, this only pertains to vulnerabilities in proprietary products, and the means by which the scores are calculated are not transparent.<\/p>\n<h2>CVE Trends (RIP) and alternatives<\/h2>\n<p><a href=\"https:\/\/cvetrends.com\/\" target=\"_blank\" rel=\"noopener\">CVE Trends<\/a>, which at the time of writing is not active due to X\u2019s restrictions on usage of its API, is a crowdsourced dashboard of information scraped from X, Reddit, GitHub, and NVD. It showed the ten most currently discussed vulnerabilities based on that data.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959090\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-4.png\" alt=\"\" width=\"602\" height=\"277\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-4.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-4.png?resize=300,138 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure 4: The CVE Trends dashboard<\/em><\/p>\n<p>As shown in the screenshot above, the dashboard included CVSS and EPSS scores, CVE information, and sample tweets and Reddit posts, as well as \u2018published\u2019 dates and a measurement of discussion activity in the last few days (or 24 hours).<\/p>\n<p>While CVE Trends could be useful for getting an idea of the current \u2018flavor of the month\u2019 CVEs among the security community \u2013 and could also be helpful in obtaining breaking news about new vulnerabilities \u2013 it didn&#8217;t aid in prioritization above and beyond new, high-impact bugs. It only showed ten vulnerabilities at a time, and some of those \u2013 including Log4j, as you can see in the screenshot \u2013 were relatively old, though still being discussed because of their prevalence and notoriety.<\/p>\n<p>As noted above, CVE Trends is currently inactive, and has been since mid-2023. As of this writing, visitors to the site receive the following message, which also appeared as the <a href=\"https:\/\/x.com\/SimonByte\/status\/1668288089293242368\" target=\"_blank\" rel=\"noopener\">final message<\/a> on its creator&#8217;s Twitter feed:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959089\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-5.png\" alt=\"\" width=\"602\" height=\"162\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-5.png 602w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-5.png?resize=300,81 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure 5: CVE Trends&#8217; farewell message \/ tweet<\/em><\/p>\n<p>It remains to be seen whether X will relax its API usage restrictions, or if the creator of CVE Trends, <a href=\"https:\/\/twitter.com\/SimonByte\" target=\"_blank\" rel=\"noopener\">Simon J. Bell<\/a>, will be in a position to explore other options to restore the site\u2019s functionality.<\/p>\n<p>After the demise of Bell&#8217;s site, a company called Intruder developed <a href=\"https:\/\/intel.intruder.io\/\" target=\"_blank\" rel=\"noopener\">their own version<\/a> of this tool, in beta as of this writing, which is also called \u2018CVE Trends.\u2019 It comes complete with a 0-100 temperature-style \u2018Hype score\u2019 based on social media activity.<\/p>\n<p>SOCRadar also maintains a similar service, called \u2018<a href=\"https:\/\/socradar.io\/labs\/cve-radar\/\" target=\"_blank\" rel=\"noopener\">CVE Radar<\/a>,\u2019 which includes details of the number of tweets, news reports, and vulnerability-related repositories in its dashboard; in a touching gesture, it acknowledges Simon Bell&#8217;s CVE Trends work on its main page (as Intruder does on its About page). Both CVE Radar and Intruder\u2019s version of CVE Trends usefully incorporate the texts of related tweets, providing an at-a-glance digest of the social media discussion about a given bug. Whether the developers of either tool intend to incorporate other social media platforms, given <a href=\"https:\/\/www.forbes.com\/sites\/danidiplacido\/2024\/11\/19\/the-x-twitter-exodus-to-bluesky-explained\/\" target=\"_blank\" rel=\"noopener\">the exodus from X<\/a>, is unknown.<\/p>\n<h2>CVEMap<\/h2>\n<p>Introduced in mid-2024, <a href=\"https:\/\/github.com\/projectdiscovery\/cvemap\" target=\"_blank\" rel=\"noopener\">CVEMap<\/a> is a relatively new command-line interface tool by ProjectDiscovery that <a href=\"https:\/\/blog.projectdiscovery.io\/announcing-cvemap-from-projectdiscovery\/\" target=\"_blank\" rel=\"noopener\">aims to consolidate several aspects of the CVE ecosystem<\/a> \u2013 including CVSS score, EPSS score, the age of the vulnerability, KEV Catalog entries, proof-of-concept data, and more. CVEMap doesn\u2019t offer or facilitate any new information or scores, as it\u2019s solely an aggregation tool. However, the fact that it combines various sources of vulnerability information into a simple interface \u2013 while also allowing filtering by product, vendor, and so on \u2013 may make it useful for defenders seeking a means to make informed prioritization decisions based on multiple information sources.<\/p>\n<h2>Bug Alert<\/h2>\n<p><a href=\"https:\/\/bugalert.org\/\" target=\"_blank\" rel=\"noopener\">Bug Alert<\/a> is a service designed to fill a specific gap for responders: It aims to alert users solely to critical, high-impact vulnerabilities (the ones that always seem to hit on a Friday afternoon or just before a public holiday) as quickly as possible via email, SMS, or phone notifications, without having to wait for security bulletins or CVE publication. It\u2019s intended to be a community-driven effort, and relies on researchers submitting notices of new vulnerabilities as pull requests to the <a href=\"https:\/\/github.com\/BugAlertDotOrg\/bugalert\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a>. It\u2019s not clear if Bug Alert\u2019s author is still maintaining it; at the time of writing, the last activity on the Github repository was in October 2023.<\/p>\n<p>As with CVE Trends, while Bug Alert may fill a useful niche, it\u2019s not designed to be used for prioritization in general.<\/p>\n<h2>vPrioritizer<\/h2>\n<p><a href=\"https:\/\/github.com\/varchashva\/vPrioritizer\" target=\"_blank\" rel=\"noopener\">vPrioritizer<\/a> is an open-source framework designed to allow users to assess and understand contextualized risk on a per-asset or per-vulnerability basis, thereby merging asset management with prioritization. This is achieved by using CVSS scores together with \u201ccommunity analytics\u201d and results from vulnerability scanners. Sadly, despite being mentioned in the SSVC whitepaper in 2019 and presented at <a href=\"https:\/\/www.blackhat.com\/us-20\/arsenal\/schedule\/#vprioritizer-learn-to-say-no-to-almost-every-vulnerability-art-of-risk-prioritisation-21192\" target=\"_blank\" rel=\"noopener\">the Black Hat USA Arsenal in 2020<\/a>, it is not clear if vPrioritizer\u2019s developer still maintains the project; as of this writing, the last commit to the GitHub repository was in October 2020.<\/p>\n<h2>Vulntology<\/h2>\n<p><a href=\"https:\/\/github.com\/usnistgov\/vulntology\" target=\"_blank\" rel=\"noopener\">Vulntology<\/a> is a NIST-led effort to characterize vulnerabilities (the name is a portmanteau of \u2018vulnerability\u2019 and \u2018ontology\u2019) according to how they can be exploited, the potential impact of exploitation, and mitigating factors. Its stated goals include the standardization of description of vulnerabilities (for example, in vendor advisories and security bulletins); improving the level of detail in such descriptions; and enabling easier sharing of vulnerability information across language barriers. An example of a \u2018vulntological representation\u2019 is available <a href=\"https:\/\/github.com\/usnistgov\/vulntology\/tree\/main\/examples\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959088\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-6.png\" alt=\"\" width=\"551\" height=\"310\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-6.png 551w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-6.png?resize=300,169 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/a><\/p>\n<p><em>Figure 6: An illustration of Vulntology\u2019s proposed work, taken from the <\/em><a href=\"https:\/\/github.com\/usnistgov\/vulntology\" target=\"_blank\" rel=\"noopener\"><em>project\u2019s GitHub repository<\/em><\/a><\/p>\n<p>Vulntology is therefore not a scoring framework, or even a decision tree. Instead, it\u2019s a small step towards a common language, and one which may, if it becomes widely-adopted, be of significant value when it comes to vulnerability management. A standardized approach to describing vulnerabilities would certainly be of use when evaluating multiple vendor security advisories, vulnerability intelligence feeds, and other sources. We mention it here because it does have some implications for vulnerability prioritization, albeit in the long-term, and it is attempting to solve a problem within the vulnerability management field. The last commit to the project&#8217;s Github appears to have occurred in spring 2023.<\/p>\n<h2>Criminal marketplace data<\/h2>\n<p>Finally, a quick word on criminal marketplace data and how future research might utilize it for prioritization. Back in 2014, <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2630069\" target=\"_blank\" rel=\"noopener\">researchers from the University of Trento<\/a> conducted a study on whether CVSS scores are a good predictor for exploitation. They concluded that CVSS scores don\u2019t match the rates of exploitation, but they did conclude that remediation \u201cin response to exploit presence in black markets yields the largest risk reduction.\u201d It would be an interesting avenue of research to see if the same is still true today; exploit markets have increased in size since 2014, and there is a large underground economy dedicated to the marketing and selling of exploits.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-959087\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-7.png\" alt=\"\" width=\"316\" height=\"333\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-7.png 316w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/Figure-7.png?resize=285,300 285w\" sizes=\"auto, (max-width: 316px) 100vw, 316px\" \/><\/a><\/p>\n<p><em>Figure 7: A user offers a Windows local privilege escalation exploit for sale on a criminal forum<\/em><\/p>\n<p>Looking not only at the existence of exploits in criminal marketplaces, but also at <a href=\"https:\/\/www.scip.ch\/en\/?labs.20161013\" target=\"_blank\" rel=\"noopener\">prices<\/a>, levels of interest, and customer feedback, could be further useful data points in informing prioritization efforts.<\/p>\n<p>The challenge, of course, is the difficulty of accessing those marketplaces and scraping data; many are closed to registration and only accessible via referral, payment, or reputation. And while the underground economy has increased in size, it\u2019s also arguably less centralized than it once was. Prominent forums may serve as an initial place to advertise wares, but many of the salient details \u2013 including prices \u2013 are sometimes only available to interested potential buyers via private messages, and the actual negotiations and sales often occur in out-of-band channels like Jabber, Tox, and Telegram. Further research on this issue is needed to determine if it could be a feasible source of data for prioritization.<\/p>\n<h1>Combination and customization are key<\/h1>\n<p>Having examined CVSS, EPSS, SSVC, and the KEV Catalog in depth \u2013 and some other tools and frameworks more briefly \u2013 you won\u2019t be surprised to learn that we didn\u2019t find a magic solution, or even a magic combination of solutions, that will solve all prioritization problems. However, a <em>combination<\/em> is almost always better than using a single framework. More data points mean a more informed view, and while this might require some technical effort up front, the outputs of most of the tools and frameworks we\u2019ve discussed are designed to be easily ingested in an automated manner (and tools like CVEMap have done some of the heavy lifting already).<\/p>\n<p>As well as combining outputs, <em>customization<\/em> is also really important. This is often overlooked, but prioritization isn\u2019t just about the vulnerabilities, or even the exploits. Of course, they\u2019re a big part of the issue, but the key point is that a vulnerability, from a remediation perspective, doesn\u2019t exist in isolation; considering its inherent properties may be helpful in some circumstances, but the only truly significant data point is how that vulnerability could impact <em>you.<\/em><\/p>\n<p>Moreover, every organization treats prioritization differently, depending on what it does, how it works, what its budget and resources look like, and what its appetite is for risk.<\/p>\n<p>Single, one-size-fits-all scores and recommendations don\u2019t often make much logical sense from the perspective of assessing frameworks, but they make even less sense from the perspective of individual organizations trying to prioritize remediation. Context is everything. So whatever tools or frameworks you use, put your organization \u2013 not a score or a ranking \u2013 at the center of the equation. You may even want to do this at a more granular level, depending on the size and structure of your organization: prioritizing and contextualizing per division, or department. In any case, customize as much as you can, and remember that however prominent and popular a framework may be, its outputs are only a guide.<\/p>\n<p>With some systems, like CVSS or SSVC, there are built-in options to customize and tailor outputs. With others, like EPSS and the KEV Catalog, customization isn\u2019t really the point, but you can still add context to those results yourself, perhaps by feeding that information into other tools and frameworks and looking at the entire picture as much as possible.<\/p>\n<p>Prioritization also goes beyond the tools we discuss here, of course. We\u2019ve focused on them in this series because they\u2019re an interesting component of vulnerability management, but the information that should feed into prioritization decisions will ideally come from a variety of other sources: threat intelligence, weaknesses, security posture, controls, risk assessments, results from pentests and security audits, and so on.<\/p>\n<p>To reiterate a point from our first article, while we\u2019ve pointed out some of the downsides to these tools and frameworks, we don\u2019t intend in in any way to denigrate their developers or their efforts, and we\u2019ve tried to be fair and even-handed in our assessments. Creating frameworks like these is a lot of hard work and requires considerable thought and planning \u2013 and they\u2019re there to be used, so you should use them when and where it makes sense to do so. We hope that this series will allow you to do this in a safe, informed, and effective manner.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/12\/30\/prioritizing-patching-a-deep-dive-into-frameworks-and-tools-part-2-alternative-frameworks\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/12\/shutterstock_2483952669.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Wixey| Date: Mon, 30 Dec 2024 15:05:30 +0000<\/strong><\/p>\n<p>In the second of a two-part series on tools and frameworks designed to help with remediation prioritization, we explore some alternatives to CVSS<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[24784,19245,12557,27030,16771],"class_list":["post-25620","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-cvss","tag-patch-tuesday","tag-patching","tag-sophos-x-ops","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25620"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25620\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}