Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

NIST CISA New Metric Predicts Exploit Risk

May 21, 2025
Reading Time: 3 mins read
in News
Teen Hacker Admits PowerSchool Cyberattack

Researchers from U.S. NIST and CISA have developed an important new security metric. This metric helps to determine the likelihood that a vulnerability has been exploited. A paper published this week by Peter Mell and Jonathan Spring outlined this metric. Their vulnerability exploit metric notably augments the existing Exploit Prediction Scoring System (EPSS). It also effectively builds upon CISA’S Known Exploited Vulnerabilities or KEV catalog. Studies show only about 5% of vulnerabilities are actually observed to be exploited. Yet the monthly vulnerability remediation rate for most companies currently stands at only 16%. Remediation is expensive so predicting exploitation is critically important for overall enterprise efficiency.

The researchers Mell and Spring noted some known shortcomings in both EPSS and KEV.

EPSS for example is known to have some inaccurate probability values for certain vulnerabilities. The CISA KEV catalog while useful is also likely not fully comprehensive in its listings. Their proposed new likelihood metric could help to augment EPSS based remediation efforts. It can achieve this by correcting some of these existing probability value inaccuracies. The metric could also build upon the KEV catalog by enabling comprehensiveness measurements. EPSS provides probabilities of exploitation within the next 30 days for known vulnerabilities. However its probabilities are often inaccurate for vulnerabilities previously observed to be exploited. Fortunately these probabilities are not randomly inaccurate as EPSS usually underestimates true probability. Mell and Spring call their new formula Likely Exploited Vulnerabilities or LEV probabilities.

These new LEV probabilities have at least four distinct and important potential use cases.

They can measure the expected number and proportion of vulnerabilities exploited by threat actors. They can also help to estimate the overall comprehensiveness of the existing KEV catalog. LEV augments KEV-based vulnerability remediation by identifying higher probability vulnerabilities possibly missing. It also augments EPSS-based prioritization by identifying vulnerabilities that may be currently underscored. The research paper listed two vulnerability examples where LEV and EPSS probabilities clearly differed. For CVE-2023-1730 a WordPress plugin flaw LEV probability was 0.70 while EPSS peaked at 0.16. For CVE-2023-29373 a Microsoft RCE flaw LEV was 0.54 while EPSS showed only 0.08. Their work also identified several hundred other vulnerabilities with a probability approaching 1.0.

Interestingly many of these high-probability vulnerabilities identified by LEV are not in KEV lists. This is one key reason that these new LEV lists cannot replace KEV lists. LEV cannot identify precisely which of many low probability vulnerabilities will actually be exploited. It can only help to compute how many of them are statistically expected to be exploited. KEV lists however identify the exact specific vulnerabilities that have already been exploited. Thus LEV provides a broader probabilistic view aiding in effective vulnerability remediation prioritization. Mell and Spring said they are now actively looking for various industry partners. They want to collaborate with these partners to obtain LEV metric performance measurements. This innovative new metric aims to significantly improve overall enterprise vulnerability management practices.

Reference:

  • NIST and CISA Develop New Metric To Predict Exploited Cybersecurity Vulnerabilities
Tags: Cyber NewsCyber News 2025Cyber threatsMay 2025
ADVERTISEMENT

Related Posts

US Seizes $225M In Record Crypto Bust

UK Data Law Risks EU Adequacy Deal

June 20, 2025
US Seizes $225M In Record Crypto Bust

US Seizes $225M In Record Crypto Bust

June 20, 2025
US Seizes $225M In Record Crypto Bust

Argentina Busts Russian Disinformation Ring

June 20, 2025
Iran Slows Internet to Prevent Cyberattacks

Episource data breach affects over 5M patients

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Ryuk ransomware’s access enabler extradited

June 19, 2025
Iran Slows Internet to Prevent Cyberattacks

Iran Slows Internet to Prevent Cyberattacks

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial