• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

CISO's Dilemma: Why Focusing on High and Critical CVSS Is an Inefficient Effort for their team


By VARINDIA - 2023-10-23
CISO's Dilemma: Why Focusing on High and Critical CVSS Is an Inefficient Effort for their team

By Vinyl Shetty  

 

"Picture this – you're the CISO, the guardian of your organisation's digital fortress, the Head of Cyber Security. Your days are a relentless struggle to keep up with the ever-mounting threats. Your Senior Security Manager, a dedicated but overwhelmed individual, approaches you one day with a heavy burden to bear.

 

"In addition to the 25+ security tools that my team manages," they confess, "we've combed through our sprawling digital landscape. Across 179 applications, 10,000+ endpoints, 1,000+ servers, and 400 databases, we've unearthed a staggering 7,000 vulnerabilities. Despite our diligent, periodic technical vulnerability mitigation approach, we're faced with an impossible question: How should we optimally prioritise our efforts to ward off the looming cyber threats, especially when our resources are painfully limited?"

 

As the ultimate authority, you're tempted to utter the industry-worn advice: "Focus on Medium and High vulnerabilities based on the CVSS score." After all, the Common Vulnerability Scoring System (CVSS) has been the trusty lighthouse guiding your ship since 2005.

 

But hold on a moment. The CVSS, once a beacon in the storm, now feels somewhat outdated in this ever-shifting threat landscape. For the uninitiated, CVSS scores range from 0 to 10, with higher scores indicating more severe vulnerabilities, neatly categorised as Low, Medium, High, and Critical.

 

However, in today's cybersecurity arena, the CVSS seems to play a cruel joke. a)Over 60% of vulnerabilities in the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) wear the high or critical badge. With such a deluge, it's impossible to distinguish the truly menacing from the mere shadows.

 

b) For instance, consider CVE-2017-0144, which inflicted a colossal $10 billion in ransomware damages worldwide. It bears a CVSS v2 rating of 9.3 and a CVSS v3 rating of 8.1. Yet, other vulnerabilities boasting a perfect CVSS 10 haven't seen a single exploitation. The enigma deepens.

c) Is it wiser to tackle 150 High CVEs, or perhaps prfioritize 2 Critical ones? What if a seemingly harmless Low CVE teams up with a Medium sibling to create a disaster scenario?

For instance, imagine 10,000 instances of CVE-2017-8283 in Ubuntu VMs versus one instance of CVE-2021-44228, aka log4shell, in a Java-based web application. The first seems daunting but would tempt your team to address first as it is impacting most assets , but if the team continues to this path , they going in a massive scope of work of activity which will be a rabbit hole as this vulnerability cannot be exploited if Ubuntu in your organisation has been purposefully modified, yet the second which affected only one webserver with critical data , if exploited can actually bring your entire enterprise to its knees and bring end to the business

d) Even if you diligently patch all the high and critical vulnerabilities per CVSS, 18% of vulnerabilities with known exploits remain unaddressed. CVSS, once the guiding star, now feels insufficient to navigate the storm of new vulnerabilities flooding the NVD databases.

 

As a CISO, it's time to seek alternatives. Ask your vulnerability assessment report provider to go beyond CVSS scores and the following metrics to each vulnerability highlighted

a) Known Exploited Vulnerabilities (KEV) In November 2021, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) introduced a new category: Known Exploited Vulnerabilities (KEV). For CVEs with verified "active exploitation or attempted exploitation," these are flagged to guide enterprises in their mitigation efforts.

b)The Exploit Prediction Scoring System (EPSS), published by FIRST in 2019, offers another promising path. It analyzes over 6 million observed exploitation attempts, incorporating data from threat intelligence providers, CISA's KEV catalog, and various vulnerability characteristics.

 

The results are nothing short of astonishing. If you cling to the old "fix all high and critical" strategy, you'll be drowning in the sheer volume. But adopting EPSS with a modest threshold can reduce your workload by 87.5%, freeing your overburdened staff. Let me prove this to you.

EPSS score takes in account of following :

a) Detected exploitation activity in the wild from reputed security vendors

b) Public mention of exploitation like The Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerability (KEV) catalog, Google’s Project Zero, Trend Micro’s Zero Day Initiative (ZDI)

c) Publicly available exploit code by querying github, exploit-DB ,Metasploit

d)Open source security tools intelligence

e)Social media mentions

f) References with labels

g)Keyword description of vulnerability

h)Common Weakness Enumeration (CWE)

i) Vendor labels

j) Age of vulnerability

 

Its output is a number from 0 to 1 for every published CVE, indicating the likelihood of exploitation in the next 30 days. The score updates daily as new data emerges.

 

The results are impressive, to say the least. Using a traditional “fix all high and critical” (per CVSS) strategy, you would need to patch the majority of known issues (because most are high are critical). And in doing so, you will fix ~82% of CVEs ever exploited (per the EPSS, not KEV data set).

 

Compare that approach to using the EPSS v3 with a threshold score of 0.088 (remediating all issues that score higher than this rating). To achieve roughly the same outcome with EPSS, you will only need to resolve 7.3% of all known CVEs.

 

This is only ~12.5% of the fraction necessary when using CVSS.

Now, Imagine with this approach , you increased the efficiency of effort by 100-12.5 = 87.5% of your overworked staff who are already managing umpteen security tools and thousand other security issues for your organisation. They will thank you for being their saviour.

 

To make it even more precise, some vendors offer reachability analysis. They can identify which vulnerabilities, while theoretically reachable, are challenging to exploit due to various reasons. Conversely, they uncover the lurking threats that are deceptively simple to exploit.

 

Imagine this new approach, where you boost your efficiency by 87.5%, empowering your staff to tackle countless other security issues. In conclusion, focusing solely on CVSS High and Critical may no longer suffice in the age of information warfare. Are you ready to explore this new frontier in vulnerability management?" with the best part being EPSS score and CISA KEV being a free resource available to all organisations.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.