Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 

Posted on May 20, 2025May 20, 2025 By CWS

Researchers from CISA and NIST have proposed a brand new cybersecurity metric designed to calculate the probability {that a} vulnerability has been exploited within the wild. 

Peter Mell of NIST and Jonathan Spring of CISA have printed a paper describing equations for what they name Possible Exploited Vulnerabilities, or LEV. 

Hundreds of vulnerabilities are found yearly in software program and {hardware}, however solely a small proportion are ever exploited within the wild. 

Realizing which vulnerabilities have been exploited or predicting which flaws are more likely to be exploited is vital for organizations when making an attempt to prioritize patching. 

Identified Exploited Vulnerabilities (KEV) lists such because the one maintained by CISA and the Exploit Prediction Scoring System (EPSS), which depends on information to estimate the likelihood {that a} vulnerability will likely be exploited, will be very helpful. Nevertheless, KEV lists could also be incomplete and EPSS could also be inaccurate.

LEV goals to boost — not exchange — KEV lists and EPSS. That is accomplished by equations that keep in mind variables equivalent to the primary date when an EPSS rating is offered for a specified vulnerability, the date of the newest KEV listing replace, inclusion in KEV, and the EPSS rating for a given day (measured throughout a number of days).

LEV possibilities will be helpful for measuring the anticipated quantity and proportion of vulnerabilities that menace actors have exploited. 

It may also be helpful for estimating the comprehensiveness of KEV lists. “Beforehand, KEV maintainers had no metric to display how shut their listing was to together with all related vulnerabilities,” the researchers defined.Commercial. Scroll to proceed studying.

As well as, LEV possibilities can assist increase KEV- and EPSS-based vulnerability remediation prioritization — within the case of KEV by figuring out higher-probability vulnerabilities which may be lacking, and within the case of EPSS by discovering vulnerabilities which may be underscored.

Whereas in concept LEV might grow to be a really great tool for vulnerability prioritization, the researchers identified that collaboration is important, and NIST is in search of business companions “with related datasets to empirically measure the efficiency of LEV possibilities”.

Associated: Exploitation Lengthy Identified for Most of CISA’s Newest KEV Additions

Associated: Essential Vulnerability in AI Builder Langflow Beneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Security Week News Tags:CISA, Exploitation, Metric, NIST, Probability, Proposed, Researchers, Vulnerability

Post navigation

Previous Post: Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
Next Post: AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Related Posts

Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Security Week News
Google Warns UK Retailer Hackers Now Targeting US Security Week News
Russian APT Exploiting Mail Servers Against Government, Defense Organizations Security Week News
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit Security Week News
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News
Cisco Patches 35 Vulnerabilities Across Several Products Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News