Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":954,"date":"2023-08-26T08:59:39","date_gmt":"2023-08-26T08:59:39","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/"},"modified":"2023-08-26T08:59:39","modified_gmt":"2023-08-26T08:59:39","slug":"epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/","title":{"rendered":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm"},"content":{"rendered":"

In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d<\/a>, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits.<\/p>\n

In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring.<\/p>\n

Digging Deeper: The Importance of EPSS<\/strong><\/span><\/h2>\n

EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org<\/a>). Its overall goal is to help security teams better prioritize vulnerability remediation work.<\/p>\n

Fun fact: <\/strong>Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development.<\/p>\n

Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability.<\/p>\n

EPSS vs CVSS: What\u2019s the Difference?<\/strong><\/span><\/h2>\n

EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity<\/strong> of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats.<\/p>\n

EPSS, on the other hand, estimates the probability<\/strong> that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize<\/em> vulnerabilities, which makes it difficult to make decisions on what to fix first.<\/p>\n

Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit.<\/p>\n

What It Means for Cisco Vulnerability Management Customers<\/span><\/h2>\n

Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future.<\/p>\n

Figure 1: Explore page in Cisco Vulnerability Management platform <\/em><\/p>\n\n

While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most.<\/p>\n

In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk.<\/p>\n

Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss<\/a><\/p>\n

Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>
\n
Facebook<\/a><\/strong>
\n
Twitter<\/a><\/strong>
\n
LinkedIn<\/a><\/strong><\/p>\n

\u200b<\/p>\n

In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d<\/a>, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits.<\/p>\n

In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring.<\/p>\n

Digging Deeper: The Importance of EPSS<\/strong><\/h2>\n

EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org<\/a>). Its overall goal is to help security teams better prioritize vulnerability remediation work.<\/p>\n

Fun fact: <\/strong>Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development.<\/p>\n

Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability.<\/p>\n

EPSS vs CVSS: What\u2019s the Difference?<\/strong><\/h2>\n

EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity<\/strong> of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats.<\/p>\n

EPSS, on the other hand, estimates the probability<\/strong> that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize<\/em> vulnerabilities, which makes it difficult to make decisions on what to fix first.<\/p>\n

Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit.<\/p>\n

What It Means for Cisco Vulnerability Management Customers<\/h2>\n

Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future.<\/p>\n

Figure 1: Explore page in Cisco Vulnerability Management platform <\/em><\/p>\n\n

While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most.<\/p>\n

In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk.<\/p>\n

Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss<\/a><\/p>\n

Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Learn about EPSS, how it compares to CVSS, and the role it plays in Cisco Vulnerability Management\u2019s risk scoring.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d<\/a>, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits.<\/p>\n

In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring.<\/p>\n

Digging Deeper: The Importance of EPSS<\/strong><\/span><\/h2>\n

EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org<\/a>). Its overall goal is to help security teams better prioritize vulnerability remediation work.<\/p>\n

Fun fact: <\/strong>Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development.<\/p>\n

Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability.<\/p>\n

EPSS vs CVSS: What\u2019s the Difference?<\/strong><\/span><\/h2>\n

EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity<\/strong> of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats.<\/p>\n

EPSS, on the other hand, estimates the probability<\/strong> that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize<\/em> vulnerabilities, which makes it difficult to make decisions on what to fix first.<\/p>\n

Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit.<\/p>\n

What It Means for Cisco Vulnerability Management Customers<\/span><\/h2>\n

Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future.<\/p>\n

Figure 1: Explore page in Cisco Vulnerability Management platform <\/em><\/p>\n

While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most.<\/p>\n

In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk.<\/p>\n

Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss<\/a><\/p>\n

Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>
\n
Facebook<\/a><\/strong>
\n
Twitter<\/a><\/strong>
\n
LinkedIn<\/a><\/strong><\/p>\n

\u200b<\/p>\n

In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d<\/a>, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits.<\/p>\n

In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring.<\/p>\n

Digging Deeper: The Importance of EPSS<\/strong><\/h2>\n

EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org<\/a>). Its overall goal is to help security teams better prioritize vulnerability remediation work.<\/p>\n

Fun fact: <\/strong>Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development.<\/p>\n

Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability.<\/p>\n

EPSS vs CVSS: What\u2019s the Difference?<\/strong><\/h2>\n

EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity<\/strong> of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats.<\/p>\n

EPSS, on the other hand, estimates the probability<\/strong> that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize<\/em> vulnerabilities, which makes it difficult to make decisions on what to fix first.<\/p>\n

Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit.<\/p>\n

What It Means for Cisco Vulnerability Management Customers<\/h2>\n

Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future.<\/p>\n

Figure 1: Explore page in Cisco Vulnerability Management platform <\/em><\/p>\n

While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most.<\/p>\n

In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk.<\/p>\n

Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss<\/a><\/p>\n

Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n

Cisco Secure Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Learn about EPSS, how it compares to CVSS, and the role it plays in Cisco Vulnerability Management\u2019s risk scoring.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":951,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nEPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits. In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring. Digging Deeper: The Importance of EPSS EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org). Its overall goal is to help security teams better prioritize vulnerability remediation work. Fun fact: Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development. Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability. EPSS vs CVSS: What\u2019s the Difference? EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats. EPSS, on the other hand, estimates the probability that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize vulnerabilities, which makes it difficult to make decisions on what to fix first. Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit. What It Means for Cisco Vulnerability Management Customers Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future. Figure 1: Explore page in Cisco Vulnerability Management platform While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most. In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk. Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels Instagram Facebook Twitter LinkedIn \u200b In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits. In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring. Digging Deeper: The Importance of EPSS EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org). Its overall goal is to help security teams better prioritize vulnerability remediation work. Fun fact: Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development. Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability. EPSS vs CVSS: What\u2019s the Difference? EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats. EPSS, on the other hand, estimates the probability that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize vulnerabilities, which makes it difficult to make decisions on what to fix first. Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit. What It Means for Cisco Vulnerability Management Customers Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future. Figure 1: Explore page in Cisco Vulnerability Management platform While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most. In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk. Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Learn about EPSS, how it compares to CVSS, and the role it plays in Cisco Vulnerability Management\u2019s risk scoring.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-26T08:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm\",\"datePublished\":\"2023-08-26T08:59:39+00:00\",\"dateModified\":\"2023-08-26T08:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\"},\"wordCount\":1726,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\",\"name\":\"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif\",\"datePublished\":\"2023-08-26T08:59:39+00:00\",\"dateModified\":\"2023-08-26T08:59:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/","og_locale":"en_US","og_type":"article","og_title":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm","og_description":"In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits. In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring. Digging Deeper: The Importance of EPSS EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org). Its overall goal is to help security teams better prioritize vulnerability remediation work. Fun fact: Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development. Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability. EPSS vs CVSS: What\u2019s the Difference? EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats. EPSS, on the other hand, estimates the probability that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize vulnerabilities, which makes it difficult to make decisions on what to fix first. Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit. What It Means for Cisco Vulnerability Management Customers Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future. Figure 1: Explore page in Cisco Vulnerability Management platform While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most. In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk. Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels Instagram Facebook Twitter LinkedIn \u200b In our March 2023 blog, \u201cWhat is EPSS and Why Does It Matter?\u201d, Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits. In this blog, we\u2019ll cover more details about EPSS, how it compares to CVSS, as well as the role it plays in Cisco Vulnerability Management\u2019s risk scoring. Digging Deeper: The Importance of EPSS EPSS is an open-source, \u201cdata-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild\u201d (FIRST.org). Its overall goal is to help security teams better prioritize vulnerability remediation work. Fun fact: Cisco (formerly Kenna Security) licenses the patent \u201cExploit Prediction Based on Machine Learning\u201d to FIRST.org to enable EPSS development. Anonymized data from the Cisco Vulnerability Management platform was used by the creators of EPSS to compare which vulnerabilities were being exploited in the wild to which vulnerabilities organizations were remediating. The findings revealed that remediation strategies were inconsistent and ad-hoc. Based on the evidence collected that showed what was being exploited, the creators built a data model to predict exploitability. EPSS vs CVSS: What\u2019s the Difference? EPSS was initially inspired by the Common Vulnerability Scoring System (CVSS). CVSS assigns scores to vulnerabilities based on their principal characteristics; the score indicates the severity of a vulnerability, providing a range from 0.0 to 10.0 (the higher the score, the greater severity). CVSS can be categorized into low, medium, and high severity, and organizations can use CVSS to help prioritize vulnerabilities that exist in the system. However, CVSS on its own doesn\u2019t indicate a likelihood of exploitation, leading to criticisms that call out its ineffectiveness in prioritizing and predicting threats. EPSS, on the other hand, estimates the probability that a vulnerability will be exploited in the wild in the next 30 days, with a score ranging between 0 to 1. EPSS looks at two key prioritization strategies: coverage and efficiency. Coverage is the proportion of vulnerabilities with known exploitation activity that are prioritized. Efficiency is the proportion of all prioritized vulnerabilities with known exploitation activity. Despite its ability to help in predicting which vulnerabilities will be exploited in the wild, EPSS doesn\u2019t provide all the information needed to deprioritize vulnerabilities, which makes it difficult to make decisions on what to fix first. Coupling EPSS and CVSS scoring data enables organizations to more effectively prioritize vulnerabilities based on both severity and probability of exploitation. Even so, there are other data sources like real-time threat data that should be incorporated into vulnerability prioritization scoring for optimized results. More on that in just a bit. What It Means for Cisco Vulnerability Management Customers Risk Scoring in the Cisco Vulnerability Management platform helps customers prioritize the vulnerabilities that pose the greatest risk to their specific organizations, while deprioritizing the ones that don\u2019t. Our risk score is continuously evolving to include the latest inputs for the most accurate prioritization. This update easily enables customers to identify and remediate top priority vulnerabilities based on the prediction that it will become an Active Internet Breach in the near future. Figure 1: Explore page in Cisco Vulnerability Management platform While it\u2019s important to understand a vulnerability may be exploited in the future, it\u2019s even more important to know which vulnerabilities are already being exploited. That\u2019s why, in conjunction with EPSS and CVSS, Cisco Vulnerability Management risk scoring incorporates an organization\u2019s internal security data and threat and exploit intelligence from 19+ feeds, including Cisco Talos, to not only determine how risky a vulnerability is, but to also understand the volume and velocity at which the vulnerability is being targeted. By leveraging the risk score in Cisco Vulnerability Management, customers can determine which vulnerabilities pose the biggest risk to their organization and which vulnerabilities are low risk and, therefore, can be deprioritized. The result is that customers are focusing their limited resources on remediating the vulnerabilities that matter most. In addition to identifying which vulnerabilities are most likely to result in an exploit, Cisco Vulnerability Management uses Risk Meter scoring to also highlight the impact of those exploits by measuring the risks of assets, groups of assets, and organizations. With accurate and quantifiable risk scores, customers can understand their organizations\u2019 current risk posture and identify the actions needed to reduce the greatest amount of risk. Interested in learning more about EPSS? Check out the site and browse the data (it\u2019s open and free): www.first.org\/epss Want to take a deeper look at Cisco Vulnerability Management? Visit our page: https:\/\/www.cisco.com\/site\/us\/en\/products\/security\/vulnerability-management\/index.html We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social! Cisco Secure Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Learn about EPSS, how it compares to CVSS, and the role it plays in Cisco Vulnerability Management\u2019s risk scoring.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/","og_site_name":"JHC","article_published_time":"2023-08-26T08:59:39+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/"},"author":{"name":"","@id":""},"headline":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm","datePublished":"2023-08-26T08:59:39+00:00","dateModified":"2023-08-26T08:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/"},"wordCount":1726,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/","url":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/","name":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif","datePublished":"2023-08-26T08:59:39+00:00","dateModified":"2023-08-26T08:59:39+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/16313480-TZMIWm.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/epss-and-its-role-in-cisco-vulnerability-management-risk-scoring-tori-burinskiy-on-august-25-2023-at-1200-pm-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Tori Burinskiy on August 25, 2023 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=954"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/951"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}