Exploit Prediction
Scoring System (EPSS)
Leonardo Pinheiro
Head of Product
Rodrigo Montoro
Head of Threat & Detection Research
@spookerlabs
About us
Clavis Segurança da Informação
● Head of Threat & Detection Research at Clavis Security
● Living in Florianópolis (Silicon Island)
● Author of 2 patented technologies (US Patent Office)
● Speaker in different conferences (Brazil,USA,Canada)
● Proud Dad and Husband
● Full Ironman triathlon (2x)
● Crossfit and Powerlifting
Rodrigo Montoro
● Head of Product at Clavis Security
● Living in Campinas
● Electrical Engineering at Unicamp with AI Specialization at
Texas Tech University
● International work experience / exchange
● Software engineer by nature, Business developer by passion
● Gym Addicted
Leonardo Pinheiro
Motivation
AGENDA
Common Vulnerabilities and Exposures (CVE) &
Common Vulnerability Scoring System v3 (CVSS)
Vulnerability Management & Challenges
Exploit Prediction Scoring System (EPSS)
1
1 Real world use and analysis
1 Conclusions
5
Clavis Segurança da Informação
Common Vulnerability
and Exposures (CVE)
&
Common Vulnerability Scoring
System (CVSS)
What is a vulnerability ?
Clavis Segurança da Informação
Weakness in an information system, system security
procedures, internal controls, or implementation that could be
exploited or triggered by a threat source.
A code or tool used to take advantage of a vulnerability is called an
exploit.
source: https://csrc.nist.gov/glossary/term/vulnerability
Common Vulnerability Exposure (CVE)
Clavis Segurança da Informação
source: https://www.ondeso.com/wp-content/uploads/2020/09/cve-summary-freebie-ondeso.pdf
Some statistics about vulnerabilities (CVE)
Clavis Segurança da Informação
Source: https://www.cvedetails.com/browse-by-date.php
Top 25 vendors
Clavis Segurança da Informação
Source:https://www.cvedetails.com/top-50-vendors.php
Common Vulnerability Scoring System (CVSS)
Clavis Segurança da Informação
The Common Vulnerability Scoring System (CVSS) is a method used
to supply a qualitative measure of severity.
CVSS is not a measure of risk.
CVSS consists of three metric groups: Base, Temporal, and
Environmental.
source: https://nvd.nist.gov/vuln-metrics/cvss
https://www.first.org/cvss/calculator/3.0
How is calculate CVSS v3 ?
Clavis Segurança da Informação
Base calculation sample
Clavis Segurança da Informação
Some statistics
Clavis Segurança da Informação
source: https://www.cvedetails.com/cvss-score-charts.php?fromform=1&vendor_id=&product_id=&startdate=1999-01-01&enddate=2022-11-11
Baixa Médio Alto Critico
Nem tudo é crítico
Top 25 vendors 2022
Clavis Segurança da Informação
Source:https://www.cvedetails.com/top-50-vendors.php
15
Clavis Segurança da Informação
Vulnerability Management &
Challenges
What is vulnerability management ?
Clavis Segurança da Informação
source: https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/
Most companies prioritize vulnerabilities
based on volume rather than business
risk
One of the biggest challenges in
Continuous Vulnerability Management is
not only mapping existing vulnerabilities
within the park, but also where to start
solving the problem
Challenge - How to prioritize ?
Clavis Segurança da Informação
Not always CVSS higher means bigger problems
Clavis Segurança da Informação
Impact
Probability
19
Clavis Segurança da Informação
Exploit Prediction
Scoring System (EPSS)
Motivation around EPSS
Clavis Segurança da Informação
Past research has shown that firms are able to fix between 5% and 20% of known
vulnerabilities per month.
Secondly, only a small subset (2%-7% of published vulnerabilities are ever seen to be
exploited in the wild)
What is EPSS ?
Clavis Segurança da Informação
The Exploit Prediction Scoring System (EPSS) is an open, data-driven
effort for estimating the likelihood (probability) that a software vulnerability
will be exploited in the wild.
The EPSS model produces a probability score between 0 and 1 (0% and
100%). The higher the score, the greater the probability that a vulnerability
will be exploited (in the next 30 days).
EPSS | Data Architecture
Clavis Segurança da Informação
MITRE’s CVE List
“Tags” Days published
Published Exploit
Security Scanners
CVSS v3 Vector
Vendor
Real Attacks
XG Boost | Poisson Regression
EPSS
EPSS | Log4Shell Example
Clavis Segurança da Informação
EPSS Model performance
Clavis Segurança da Informação
Coverage => number of exploited vulnerabilities prioritized (TP) divided by the total number
of exploited vulnerabilities (TP + FN)
Efficiency => number of exploited vulnerabilities prioritized (TP) divided by the total number
of prioritized vulnerabilities (TP+FP).
Evolution (CVSSv3, EPSSv1 & EPSSv2)
Clavis Segurança da Informação
EPSS Data Driven (part of) sources
Clavis Segurança da Informação
CVSS versus EPSS
Clavis Segurança da Informação
EPSS x CVSS
Clavis Segurança da Informação
CVE 2019-11580
Atlassian Crowd and Crowd Data Center had the
pdkinstall development plugin incorrectly enabled
in release builds. Attackers who can send
unauthenticated or authenticated requests to a
Crowd or Crowd Data Center instance can exploit
this vulnerability to install arbitrary plugins, which
permits remote code execution on systems running
a vulnerable version of Crowd or Crowd Data
Center.
CVE 2017-0061
A use-after-free vulnerability can occur during XSL
transformations when the source document for the
transformation is manipulated by script content
during the transformation. This results in a potentially
exploitable crash. This vulnerability affects
Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox <
58.
29
Clavis Segurança da Informação
Real world
data analysis
Analysis …
Clavis Segurança da Informação
Variação da volumetria baseado na criticidade
Of the 40,037 critical vulnerabilities,
2,000 have an EPSS > 0.9
Analysis | CVSS X EPSS
Clavis Segurança da Informação
Prioritize
Deprioritize
Analysis | Priorização
Clavis Segurança da Informação
Vulnerability CVSS
Microsoft Internet Explorer Unsupported Version Detection 10
SSL Version 2 and 3 Protocol Detection 9,8
Microsoft XML Parser (MSXML) and XML Core Services Unsupported 10
Google Chrome < 107.0.5304.110 Multiple Vulnerabilities 9,6
FortiClient Windows Unquoted Service Path vulnerability(FG-IR-19-281) 10
Vulnerability CVSS EPSS
Apache < 2.4.49 Multiple Vulnerabilities 10 0.97
Apache Tomcat AJP Connector Request Injection (Ghostcat) 9.8 0.96
Windows Server 2012 June 2017 Security Updates 9.8 0.96
Oracle WebLogic Server Remote Code Execution Vulnerability
(Oracle Security Alert Advisory - CVE-2019-2725)
9.8 0.96
KB4499175: Windows 7 and Windows Server 2008 R2 May
2019 Security Update (MDSUM/RIDL)
(MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)
(BlueKeep)
9.8 0.96
Prioritization based on CVSS and volumetry Prioritization based on EPSS and CVSS
33
Clavis Segurança da Informação
Conclusions
Conclusions
Clavis Segurança da Informação
● Prioritization is hard, make your life easier
● You won't get everything fix
● Fix what really matters
● Add other contexts to prioritization
● Don't rely ONLY on EPSS
Obrigado
Leonardo Pinheiro
leonardo.pinheiro@clavis.com.br
Rodrigo Montoro
rodrigo.montoro@clavis.com.br

More Related Content

PDF
Hunting for Privilege Escalation in Windows Environment
PDF
How to use Apache TVM to optimize your ML models
PPTX
Crimes virtuais conceitos e leis
PDF
Manual investigação criminal ic2 va (2017)
PPTX
Security Awareness
PPTX
Information Security Awareness Materi training
PDF
Kinh nghiệm triển khai Microservices tại Sapo.vn
PPTX
Segurança da informação
Hunting for Privilege Escalation in Windows Environment
How to use Apache TVM to optimize your ML models
Crimes virtuais conceitos e leis
Manual investigação criminal ic2 va (2017)
Security Awareness
Information Security Awareness Materi training
Kinh nghiệm triển khai Microservices tại Sapo.vn
Segurança da informação

What's hot (20)

PPTX
Lost in Translation - Blackhat Brazil 2014
PDF
Application Threat Modeling
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPT
Application Security
PPT
Application Threat Modeling
PDF
MITRE ATT&CK Framework
PDF
Cloud Summit Canada com Rodrigo Montoro
PDF
Threat Modeling Everything
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PDF
Introduction to Cybersecurity
PDF
How MITRE ATT&CK helps security operations
PPTX
Cisco Web and Email Security Overview
PDF
Threat Modeling Using STRIDE
PPTX
Information security awareness - 101
PPT
IT Security Awareness-v1.7.ppt
PDF
Putting Firepower into the Next Generation Firewall
PPTX
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
PPTX
Evolving Cybersecurity Threats
PDF
Cyber Threat Intelligence
Lost in Translation - Blackhat Brazil 2014
Application Threat Modeling
Security Training: #3 Threat Modelling - Practices and Tools
Application Security
Application Threat Modeling
MITRE ATT&CK Framework
Cloud Summit Canada com Rodrigo Montoro
Threat Modeling Everything
OWASP Top 10 2021 Presentation (Jul 2022)
Introduction to Cybersecurity
How MITRE ATT&CK helps security operations
Cisco Web and Email Security Overview
Threat Modeling Using STRIDE
Information security awareness - 101
IT Security Awareness-v1.7.ppt
Putting Firepower into the Next Generation Firewall
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
Evolving Cybersecurity Threats
Cyber Threat Intelligence
Ad

Similar to Bsides SP 2022 - EPSS - Final.pptx (20)

PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PDF
The CISO Problems Risk Compliance Management in a Software Development 030420...
PPTX
Allianz Global CISO october-2015-draft
PPTX
Fendley how secure is your e learning
PPTX
Protect Against 85% of Cyberattacks
PDF
edgescan vulnerability stats report (2018)
PPTX
Solnet dev secops meetup
PDF
Securing your web apps before they hurt the organization
PDF
Monitoring threats for pci compliance
PDF
Monitoring threats for pci compliance
DOCX
Vulnerability scanning project
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PDF
Zero Day Vulnerabilities: A threat to security.
PPTX
Vulnerability Prioritization and Prediction
PDF
Data Science for Cyber Risk
PDF
RevBits_ Redefining Cybersecurity and Developing Trustworthy Solutions in a T...
DOCX
Understanding Vulnerabilities in Software
PPTX
Sophos
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
PPTX
Securing Systems - Still Crazy After All These Years
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
The CISO Problems Risk Compliance Management in a Software Development 030420...
Allianz Global CISO october-2015-draft
Fendley how secure is your e learning
Protect Against 85% of Cyberattacks
edgescan vulnerability stats report (2018)
Solnet dev secops meetup
Securing your web apps before they hurt the organization
Monitoring threats for pci compliance
Monitoring threats for pci compliance
Vulnerability scanning project
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Zero Day Vulnerabilities: A threat to security.
Vulnerability Prioritization and Prediction
Data Science for Cyber Risk
RevBits_ Redefining Cybersecurity and Developing Trustworthy Solutions in a T...
Understanding Vulnerabilities in Software
Sophos
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Securing Systems - Still Crazy After All These Years
Ad

More from Clavis Segurança da Informação (20)

PDF
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro
PDF
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
PPTX
Big Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação
PDF
A maldição do local admin - 10o Workshop SegInfo - Apresentação
PDF
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
PDF
PDF
Palestra Clavis - Octopus
PDF
Palestra Exceda - Clavis 2016
PDF
Clavis e Cyberark promovem almoço para sobre soluções para a área de Seguranç...
PDF
Webinar #27 - Curso Permanente ComPTIA Security+ Exame SY0 401
PDF
Webinar # 21 – Análise Forense de Redes
PDF
Manobras Evasivas: Técnicas de Evasão para Varreduras com o Nmap
PDF
Tutorial: Principais Vulnerabilidades em Aplicações Web – Rafael Soares Ferre...
PDF
Testes de Invasão ajudam a alcançar a conformidade - Segurança da Informação
PDF
Entendendo como as Mídias Socias Revolucionaram os Ataques de Força Bruta
PDF
Descobrindo (e Explorando) Vulnerabilidades em Aplicações Web com o Wmap
PDF
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI - DF
PPT
Impacto sobre o Negócio da Exploração de Vulnerabilidades de Injeção em Aplic...
PPT
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI RJ
PDF
Webinar #18 – A Nova Lei de Cibercrimes
Resposta a Incidentes | Mind The Sec 2022 com Rodrigo Montoro
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Big Data e Segurança da Informação - 10o Workshop SegInfo - Apresentação
A maldição do local admin - 10o Workshop SegInfo - Apresentação
Adoção do PCI no Brasil - 10o Workshop SegInfo - Apresentação
Palestra Clavis - Octopus
Palestra Exceda - Clavis 2016
Clavis e Cyberark promovem almoço para sobre soluções para a área de Seguranç...
Webinar #27 - Curso Permanente ComPTIA Security+ Exame SY0 401
Webinar # 21 – Análise Forense de Redes
Manobras Evasivas: Técnicas de Evasão para Varreduras com o Nmap
Tutorial: Principais Vulnerabilidades em Aplicações Web – Rafael Soares Ferre...
Testes de Invasão ajudam a alcançar a conformidade - Segurança da Informação
Entendendo como as Mídias Socias Revolucionaram os Ataques de Força Bruta
Descobrindo (e Explorando) Vulnerabilidades em Aplicações Web com o Wmap
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI - DF
Impacto sobre o Negócio da Exploração de Vulnerabilidades de Injeção em Aplic...
Gerenciamento de Vulnerabilidades em Redes Corporativas - CNASI RJ
Webinar #18 – A Nova Lei de Cibercrimes

Recently uploaded (20)

PPTX
Internet of Everything -Basic concepts details
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
substrate PowerPoint Presentation basic one
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Altius execution marketplace concept.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Human Computer Interaction Miterm Lesson
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Decision Optimization - From Theory to Practice
Internet of Everything -Basic concepts details
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Examining Bias in AI Generated News Content.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Ensemble model-based arrhythmia classification with local interpretable model...
LMS bot: enhanced learning management systems for improved student learning e...
Advancing precision in air quality forecasting through machine learning integ...
substrate PowerPoint Presentation basic one
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Altius execution marketplace concept.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Human Computer Interaction Miterm Lesson
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Decision Optimization - From Theory to Practice

Bsides SP 2022 - EPSS - Final.pptx

  • 1. Exploit Prediction Scoring System (EPSS) Leonardo Pinheiro Head of Product Rodrigo Montoro Head of Threat & Detection Research @spookerlabs
  • 2. About us Clavis Segurança da Informação ● Head of Threat & Detection Research at Clavis Security ● Living in Florianópolis (Silicon Island) ● Author of 2 patented technologies (US Patent Office) ● Speaker in different conferences (Brazil,USA,Canada) ● Proud Dad and Husband ● Full Ironman triathlon (2x) ● Crossfit and Powerlifting Rodrigo Montoro ● Head of Product at Clavis Security ● Living in Campinas ● Electrical Engineering at Unicamp with AI Specialization at Texas Tech University ● International work experience / exchange ● Software engineer by nature, Business developer by passion ● Gym Addicted Leonardo Pinheiro
  • 4. AGENDA Common Vulnerabilities and Exposures (CVE) & Common Vulnerability Scoring System v3 (CVSS) Vulnerability Management & Challenges Exploit Prediction Scoring System (EPSS) 1 1 Real world use and analysis 1 Conclusions
  • 5. 5 Clavis Segurança da Informação Common Vulnerability and Exposures (CVE) & Common Vulnerability Scoring System (CVSS)
  • 6. What is a vulnerability ? Clavis Segurança da Informação Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. A code or tool used to take advantage of a vulnerability is called an exploit. source: https://csrc.nist.gov/glossary/term/vulnerability
  • 7. Common Vulnerability Exposure (CVE) Clavis Segurança da Informação source: https://www.ondeso.com/wp-content/uploads/2020/09/cve-summary-freebie-ondeso.pdf
  • 8. Some statistics about vulnerabilities (CVE) Clavis Segurança da Informação Source: https://www.cvedetails.com/browse-by-date.php
  • 9. Top 25 vendors Clavis Segurança da Informação Source:https://www.cvedetails.com/top-50-vendors.php
  • 10. Common Vulnerability Scoring System (CVSS) Clavis Segurança da Informação The Common Vulnerability Scoring System (CVSS) is a method used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS consists of three metric groups: Base, Temporal, and Environmental. source: https://nvd.nist.gov/vuln-metrics/cvss https://www.first.org/cvss/calculator/3.0
  • 11. How is calculate CVSS v3 ? Clavis Segurança da Informação
  • 12. Base calculation sample Clavis Segurança da Informação
  • 13. Some statistics Clavis Segurança da Informação source: https://www.cvedetails.com/cvss-score-charts.php?fromform=1&vendor_id=&product_id=&startdate=1999-01-01&enddate=2022-11-11 Baixa Médio Alto Critico Nem tudo é crítico
  • 14. Top 25 vendors 2022 Clavis Segurança da Informação Source:https://www.cvedetails.com/top-50-vendors.php
  • 15. 15 Clavis Segurança da Informação Vulnerability Management & Challenges
  • 16. What is vulnerability management ? Clavis Segurança da Informação source: https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/ Most companies prioritize vulnerabilities based on volume rather than business risk One of the biggest challenges in Continuous Vulnerability Management is not only mapping existing vulnerabilities within the park, but also where to start solving the problem
  • 17. Challenge - How to prioritize ? Clavis Segurança da Informação
  • 18. Not always CVSS higher means bigger problems Clavis Segurança da Informação Impact Probability
  • 19. 19 Clavis Segurança da Informação Exploit Prediction Scoring System (EPSS)
  • 20. Motivation around EPSS Clavis Segurança da Informação Past research has shown that firms are able to fix between 5% and 20% of known vulnerabilities per month. Secondly, only a small subset (2%-7% of published vulnerabilities are ever seen to be exploited in the wild)
  • 21. What is EPSS ? Clavis Segurança da Informação The Exploit Prediction Scoring System (EPSS) is an open, data-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild. The EPSS model produces a probability score between 0 and 1 (0% and 100%). The higher the score, the greater the probability that a vulnerability will be exploited (in the next 30 days).
  • 22. EPSS | Data Architecture Clavis Segurança da Informação MITRE’s CVE List “Tags” Days published Published Exploit Security Scanners CVSS v3 Vector Vendor Real Attacks XG Boost | Poisson Regression EPSS
  • 23. EPSS | Log4Shell Example Clavis Segurança da Informação
  • 24. EPSS Model performance Clavis Segurança da Informação Coverage => number of exploited vulnerabilities prioritized (TP) divided by the total number of exploited vulnerabilities (TP + FN) Efficiency => number of exploited vulnerabilities prioritized (TP) divided by the total number of prioritized vulnerabilities (TP+FP).
  • 25. Evolution (CVSSv3, EPSSv1 & EPSSv2) Clavis Segurança da Informação
  • 26. EPSS Data Driven (part of) sources Clavis Segurança da Informação
  • 27. CVSS versus EPSS Clavis Segurança da Informação
  • 28. EPSS x CVSS Clavis Segurança da Informação CVE 2019-11580 Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. CVE 2017-0061 A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
  • 29. 29 Clavis Segurança da Informação Real world data analysis
  • 30. Analysis … Clavis Segurança da Informação Variação da volumetria baseado na criticidade Of the 40,037 critical vulnerabilities, 2,000 have an EPSS > 0.9
  • 31. Analysis | CVSS X EPSS Clavis Segurança da Informação Prioritize Deprioritize
  • 32. Analysis | Priorização Clavis Segurança da Informação Vulnerability CVSS Microsoft Internet Explorer Unsupported Version Detection 10 SSL Version 2 and 3 Protocol Detection 9,8 Microsoft XML Parser (MSXML) and XML Core Services Unsupported 10 Google Chrome < 107.0.5304.110 Multiple Vulnerabilities 9,6 FortiClient Windows Unquoted Service Path vulnerability(FG-IR-19-281) 10 Vulnerability CVSS EPSS Apache < 2.4.49 Multiple Vulnerabilities 10 0.97 Apache Tomcat AJP Connector Request Injection (Ghostcat) 9.8 0.96 Windows Server 2012 June 2017 Security Updates 9.8 0.96 Oracle WebLogic Server Remote Code Execution Vulnerability (Oracle Security Alert Advisory - CVE-2019-2725) 9.8 0.96 KB4499175: Windows 7 and Windows Server 2008 R2 May 2019 Security Update (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (BlueKeep) 9.8 0.96 Prioritization based on CVSS and volumetry Prioritization based on EPSS and CVSS
  • 33. 33 Clavis Segurança da Informação Conclusions
  • 34. Conclusions Clavis Segurança da Informação ● Prioritization is hard, make your life easier ● You won't get everything fix ● Fix what really matters ● Add other contexts to prioritization ● Don't rely ONLY on EPSS

Editor's Notes

  • #6: Vulnerabilities (CVE) & Common Vulnerability Scoring System v3 (CVSS)
  • #7: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #8: https://www.ondeso.com/wp-content/uploads/2020/09/cve-summary-freebie-ondeso.pdf
  • #9: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #10: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #11: https://nvd.nist.gov/vuln-metrics/cvss
  • #12: https://www.first.org/cvss/v3.0/specification-document#1-2-Scoring
  • #13: https://www.first.org/cvss/v3.0/specification-document#1-2-Scoring
  • #14: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #15: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #17: source: https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/
  • #18: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #19: https://gist.github.com/noamsdahan/928aafbcca71f95b07472f22e35dc93c
  • #25: https://www.first.org/epss/model
  • #26: https://www.cyentia.com/epss-version-2-is-out/
  • #27: https://www.first.org/epss/model