Most vulnerability remediation programmes still prioritise patching based on CVSS severity ratings. However, severity alone does not indicate which vulnerabilities attackers are most likely to exploit.
CVSS measures theoretical impact under defined conditions. EPSS estimates real-world exploitation probability.[1][2]
As annual CVE volume continues to rise, organisations face a prioritisation overload problem: a growing number of vulnerabilities are classified as High or Critical, while remediation capacity remains limited.[3]
The result is a structural mismatch. Security teams spend effort patching vulnerabilities unlikely to be exploited, while adversaries focus on a much smaller subset of actively targeted flaws.
Effective vulnerability management requires combining
๐ธ CVSS severity
๐ธ EPSS exploitation probability
๐ธ CISA KEV intelligence
๐ธ asset criticality
๐ธ exposure context
CVSS (Common Vulnerability Scoring System) provides standardised severity ratings from 0–10.
It is designed to answer:
๐ธ If exploited successfully, how severe could impact be?
This differs fundamentally from:
๐ธ How likely is exploitation in the real world?
A CVSS base score does not automatically change when:
๐ธ proof-of-concept exploit code is released,
๐ธ ransomware groups adopt a vulnerability,
๐ธ exploitation campaigns begin at scale.[4]
This creates a major operational limitation.
A CVE scored Medium may become actively exploited within days, while many Critical vulnerabilities never experience meaningful attacker interest. In 2024, the National Vulnerability Database recorded more than 40,000 published CVEs, continuing the multi-year acceleration trend.[3]. For most teams, patching every High/Critical CVE within compliance windows is no longer realistic.
EPSS (Exploit Prediction Scoring System), maintained by FIRST, estimates the likelihood that a CVE will be exploited within 30 days.[1]
Scores range from:
๐ธ 0.0 = very low probability
๐ธ 1.0 = very high probability
Unlike CVSS, EPSS updates daily.
The model evaluates over 1,100 signals, including:
๐ธ exploit publication activity
๐ธ attacker behaviour patterns
๐ธ vulnerability age
๐ธ software prevalence
๐ธ historical exploitation data.[2]
EPSS answers:
๐ธ Which vulnerabilities should we expect attackers to target next?
EPSS provides value for:
๐ธ remediation triage
๐ธ patch SLA tuning
๐ธ threat-led prioritisation queues
EPSS improves prioritisation by helping teams focus remediation effort on vulnerabilities that are more likely to be exploited, however, this introduces an important operational trade-off between efficiency and coverage.
๐ธEfficiency = how much of your remediation effort is spent on vulnerabilities that attackers actually exploit
๐ธCoverage = how many of the eventually exploited vulnerabilities you successfully remediate
In operational terms:
๐ธHigher EPSS thresholds
→ fewer vulnerabilities are prioritised
→ remediation effort becomes more focused
→ but some exploitable vulnerabilities may be missed
๐ธLower EPSS thresholds
→ more vulnerabilities are included
→ greater chance of covering all exploitable issues
→ but with increased remediation workload
This reflects a real-world constraint: "security teams cannot remediate everything, they must decide where to focus limited capacity".
There is no universal “correct” EPSS threshold. Effective use depends on:
๐ธ organisational risk tolerance
๐ธ available remediation capacity
๐ธ criticality of affected systems
For example:
๐ธorganisations with limited patch capacity may prioritise only the highest EPSS vulnerabilities
๐ธorganisations protecting critical infrastructure may accept lower thresholds to maximise coverage
Key point: EPSS does not eliminate prioritisation decisions, it makes those decisions more informed by attacker behaviour.
The following examples illustrate how prioritisation failures translate into real-world exploitation outcomes.
Case Study 1 : Citrix Bleed (CVE-2023-4966)
Citrix Bleed affected NetScaler ADC and Gateway devices and became widely exploited following disclosure. CISA added CVE-2023-4966 to the Known Exploited Vulnerabilities catalogue after confirmed in-the-wild abuse.[5]
Initial CVSS scoring indicated severity, but urgency escalated because:
๐ธ exploitation rapidly appeared in ransomware operations,
๐ธ session token theft enabled credential bypass,
๐ธ exposed internet-facing systems became immediate targets.[5][6]
Many organisations delayed remediation because:
๐ธ patch queues were saturated with other High CVSS vulnerabilities,
๐ธ static severity scoring did not distinguish immediate exploit urgency.
๐ถ Operational lesson: CVSS indicated seriousness; exploitation intelligence defined urgency.
Case Study 2 : Ivanti Connect Secure Exploitation (CVE-2023-46805 / CVE-2024-21887)
Ivanti edge appliances became a major exploitation target in early 2024.
CISA confirmed active exploitation in the wild, where attackers chained authentication bypass and command injection flaws to gain persistent access to perimeter devices.[7]
These vulnerabilities rapidly entered:
๐ธ CISA KEV catalogues,
๐ธ incident response escalations,
๐ธ emergency remediation cycles.[5][7]
Organisations relying only on static CVSS prioritisation often responded too slowly because:
๐ธ edge appliance exposure amplified attacker value,
๐ธ exploitation accelerated before standard patch windows closed.
๐ถ Operational lesson: Exposure context and exploitation probability must override static severity queues.
The detection challenge: Security teams that rely only on CVSS scores consistently encounter the same operational challenges, making it harder to accurately detect and respond to real threats:
๐ธ Resource Allocation Distortion: Too many vulnerabilities appear equally urgent.
๐ธ Exploitation Timing Blindness: CVSS does not reflect whether attackers are actively attacking a vulnerability.
๐ธ Environmental Context Gaps: CVSS does not account for:
- internet exposure,
- crown-jewel assets,
- privilege adjacency.
๐ธ Edge Device Risk Underestimation: Internet-facing infrastructure often becomes attacker priority regardless of CVSS rank.
Patch Velocity Constraints
Modern environments cannot safely apply patches at the speed vulnerability volume demands.
In 2024, more than 40,000 CVEs were published, with a significant proportion classified as High or Critical severity.[3]
However, patching is not a simple or instantaneous process. For production systems, remediation typically requires:
๐ธ validating whether the vulnerability is present and exploitable in the environment
๐ธ testing patches in staging environments to avoid service disruption
๐ธ assessing impact on dependent applications and integrations
๐ธ scheduling maintenance windows
๐ธ deploying changes in a controlled rollout
๐ธ performing post-deployment validation and rollback planning
For critical systems, services, and customer-facing platforms, untested patching introduces risk of outage, data corruption, or business disruption.
As a result, security and operations teams must triage and sequence remediation work rather than apply updates immediately across all systems.
This creates a fundamental constraint: remediation capacity is limited, while vulnerability volume continues to increase.
Critical Overload
When a large proportion of vulnerabilities are labelled High or Critical, severity-based prioritisation loses practical meaning.
If half or more of identified vulnerabilities require urgent remediation by policy, teams cannot realistically address all of them within required timeframes.
This leads to:
๐ธ patch queues containing hundreds or thousands of “urgent” items
๐ธ no clear distinction between actively exploited vulnerabilities and theoretical risks
๐ธ delayed remediation for vulnerabilities that attackers are actually targeting
Without additional context such as exploitation likelihood or exposure, all High/Critical vulnerabilities appear equally important even when they are not.
Compliance Distortion
Many regulatory and compliance frameworks define remediation timelines based on CVSS severity thresholds.
While this provides standardisation, it also introduces unintended consequences:
๐ธ teams prioritise vulnerabilities to meet audit requirements rather than reduce real-world risk
๐ธ remediation decisions are driven by severity labels instead of attacker activity
๐ธ vulnerabilities with low exploitation likelihood may be prioritised ahead of actively targeted flaws
This creates a misalignment between what organisations are measured on (compliance) and what attackers actually exploit (opportunity).
Scenario 1 : Medium CVSS, High EPSS
A vulnerability is assigned a Medium CVSS score due to limited theoretical impact or required conditions for exploitation.
However, exploit code becomes publicly available, and threat actors begin actively targeting it causing its EPSS score to rise rapidly.
In practice, this often occurs in:
๐ธ internet-facing applications
๐ธ widely deployed software
๐ธ authentication or session-handling components
Because it is not classified as High or Critical, the vulnerability is placed lower in the patch queue.
While remediation is delayed:
๐ธ attackers scan for exposed systems
๐ธ automated exploitation begins
๐ธ initial access is established before patch deployment
Outcome: A vulnerability considered “moderate” in severity becomes a primary entry point for compromise.
What went wrong: Severity was prioritised over exploitation likelihood.
How EPSS helps: A rising EPSS score flags the vulnerability as operationally urgent, even when CVSS does not.
Scenario 2 : High CVSS, Low EPSS
A vulnerability receives a High CVSS score due to significant theoretical impact, such as privilege escalation or remote code execution.
However, exploitation requires:
๐ธ local access
๐ธ complex preconditions
๐ธ uncommon configurations
As a result, the likelihood of real-world exploitation remains low, reflected in a low EPSS score.
Despite this, CVSS-based policies force prioritisation:
๐ธ patching is scheduled urgently
๐ธ engineering resources are allocated
๐ธ change windows are consumed
This often delays remediation of other vulnerabilities that are:
๐ธ easier to exploit
๐ธ actively targeted
๐ธ externally exposed
Outcome: Security effort is consumed addressing low-probability risk while higher-probability attack paths remain open.
What went wrong: Theoretical impact was treated as immediate risk.
How EPSS helps: EPSS allows teams to deprioritise low-likelihood vulnerabilities without ignoring them, freeing capacity for higher-risk issues.
Scenario 3 : Zero-Day Active Exploitation
A previously unknown vulnerability is exploited in the wild before:
๐ธ a CVE is formally published
๐ธ a CVSS score is assigned
๐ธ EPSS models accumulate sufficient data
This commonly occurs in:
๐ธ edge devices (VPNs, firewalls, gateways)
๐ธ widely deployed enterprise software
๐ธ identity and access infrastructure
Organisations relying only on vulnerability scanning and CVSS-based prioritisation have no visibility of the risk.
Detection typically occurs only after:
๐ธ suspicious activity is observed
๐ธ threat intelligence alerts are issued
๐ธ CISA adds the vulnerability to the KEV catalogue
Outcome: Attackers gain early access during the window between exploitation and formal vulnerability classification.
What went wrong: No integration with real-time threat intelligence.
How EPSS fits: EPSS is not designed for zero-day detection, but complements KEV and threat intelligence once exploitation patterns emerge.
Key Takeaway
Across all scenarios, the failure is consistent, prioritisation decisions are made using static severity rather than dynamic attacker behaviour.
Effective vulnerability management requires combining:
๐ธ CVSS (impact)
๐ธ EPSS (likelihood)
๐ธ KEV and threat intelligence (confirmed exploitation)
๐ธ exposure context (where the vulnerability exists)
Without this combination, teams systematically:
๐ธ over-prioritise theoretical risk
๐ธ under-prioritise active threats
Modern security programmes deploy multiple tools to identify and monitor risk, including vulnerability scanners, SIEM platforms, EDR solutions, and periodic testing such as penetration tests or audits however, these tools provide partial visibility, not prioritisation. Each answers a different question but none in isolation, answers:
๐ธ Which vulnerabilities should we fix first based on real attacker behaviour?
Vulnerability Scanners (VA Tools)
Vulnerability scanners identify known CVEs across systems and typically rank them by CVSS severity.
They are effective at:
๐ธ discovering vulnerabilities at scale
๐ธ providing asset-level visibility
๐ธ supporting compliance reporting
However, they do not:
๐ธ indicate whether a vulnerability is actively being exploited
๐ธ distinguish between theoretical and likely attack paths
๐ธ account for real-time threat activity
Limitation: They generate large volumes of findings, but offer limited guidance on which ones represent immediate operational risk.
SIEM Platforms
SIEM systems aggregate logs and detect suspicious activity across environments.
They are effective at:
๐ธ identifying indicators of compromise
๐ธ correlating events across systems
๐ธ supporting incident investigation
However, they operate primarily:after attacker activity has begun
Limitation: SIEM detects exploitation attempts or breaches in progress, but does not help prioritise vulnerabilities before they are exploited.
EDR / XDR Solutions
Endpoint detection tools monitor system behaviour and detect malicious activity on endpoints.
They are effective at:
๐ธ detecting post-exploitation behaviour
๐ธ identifying malware and lateral movement
๐ธ enabling response actions
However:
๐ธ exploitation of unpatched vulnerabilities may appear as legitimate application behaviour initially
๐ธ detection often occurs only after compromise has begun
Limitation: EDR reduces impact, but does not prevent prioritisation failures.
Penetration Testing and Audits
Penetration tests and security audits provide point-in-time assessments of security posture.
They are effective at:
๐ธ identifying exploitable weaknesses
๐ธ validating security controls
๐ธ demonstrating real-world attack paths
However:
๐ธ they are periodic, not continuous
๐ธ they cover limited scope at a specific moment in time
๐ธ they do not scale to the full vulnerability landscape
Limitation: They highlight risk, but do not provide ongoing prioritisation across thousands of vulnerabilities. Its a point in time 'opinion' that could be invalidated minutes after findings are recorded, also note, security professionals treat vulnerabilities discovered this way with a completely different remediation approach ignoring SLAs.
The Core Problem
Each of these tools answers a different question:
๐ธ Vulnerability scanners → What vulnerabilities exist?
๐ธ SIEM / EDR → Is something malicious happening now?
๐ธ Pen testing → What could be exploited in this environment?
None of them answers: What are attackers most likely to exploit next across our entire environment?
Closing the Gap
Effective vulnerability prioritisation requires combining multiple signals:
๐ธ CVSS → impact severity
๐ธ EPSS → exploitation likelihood
๐ธ KEV → confirmed active exploitation
๐ธ Exposure context → where the vulnerability exists (e.g. internet-facing, critical systems)
This combination enables teams to move from:
"visibility of risk" to "prioritisation of real-world attack paths"
The following recommendations directly address the gaps identified in exploitation-aware prioritisation. Each action aligns to a specific stage in the vulnerability management lifecycle where EPSS should influence decision-making.
1๏ธโฃ Integrate EPSS at Intake and Triage
Addresses: Initial CVE assessment performed using CVSS only
Action:
๐ธ Ingest EPSS scores alongside vulnerability scan results
๐ธ Enrich CVE data automatically during intake
๐ธ Flag vulnerabilities above defined EPSS thresholds at point of entry
Outcome: High-probability vulnerabilities are identified early and enter the remediation queue with appropriate priority.
2๏ธโฃ Implement Dual-Scoring Prioritisation
Addresses: Static prioritisation based on CVSS thresholds
Action:
๐ธ Combine: CVSS (impact severity) + EPSS (exploitation likelihood)[1][2]
๐ธ Define prioritisation rules that elevate vulnerabilities with high EPSS scores, regardless of CVSS rating
Outcome: Remediation effort aligns more closely with real-world attacker behaviour rather than theoretical severity.
3๏ธโฃ Enable Continuous Re-Prioritisation
Addresses: No adjustment when exploitation likelihood changes
Action:
๐ธ Monitor EPSS score updates daily
๐ธ Trigger reclassification when:
- EPSS crosses defined thresholds
- significant score increases occur over short periods
๐ธ Integrate alerts into vulnerability management or SIEM workflows
Outcome: Vulnerabilities are re-prioritised as threat conditions evolve, reducing exposure to emerging exploitation.
4๏ธโฃ Introduce Fast-Track Remediation for High-Risk Vulnerabilities
Addresses: Standard patch cycles applied regardless of exploitation risk
Action:
๐ธ Define accelerated SLAs for:
- high EPSS vulnerabilities
- KEV-listed vulnerabilities
- internet-facing assets
๐ธ Enable out-of-band patching or compensating controls where required
Outcome: Actively targeted vulnerabilities are remediated faster than standard patch cycles allow.
5๏ธโฃ Require EPSS Review in Risk Acceptance Decisions
Addresses: Exceptions granted without considering exploitation likelihood
Action:
๐ธ Include EPSS score and percentile in risk acceptance workflows
๐ธ Require justification for accepting vulnerabilities with elevated EPSS scores
๐ธ Document exploitation risk alongside business impact
Outcome: Risk acceptance decisions reflect both impact and likelihood, reducing blind acceptance of exploitable vulnerabilities.
6๏ธโฃ Correlate EPSS with KEV and Threat Intelligence
Addresses: Disconnected use of exploitation signals
Action:
๐ธ Cross-reference vulnerabilities against:
- CISA KEV catalogue
- EPSS scores
๐ธ Prioritise vulnerabilities where:
- EPSS is high (emerging risk)
- KEV confirms active exploitation
Outcome: Teams gain both predictive and confirmed exploitation visibility, improving prioritisation accuracy.
7๏ธโฃ Apply Exposure-Based Weighting
Addresses: Lack of prioritisation based on where vulnerabilities exist
Action: Adjust prioritisation based on asset exposure:
๐ธ internet-facing systems
๐ธ externally accessible services
๐ธ identity and authentication systems
๐ธ edge infrastructure (VPNs, gateways, firewalls)
Outcome: Reflects real attacker targeting behaviour, where accessible systems are prioritised first.
8๏ธโฃ Build Adaptive SLA Tiers
Addresses: Static remediation timelines based only on CVSS severity
Action: Implement risk-based SLAs combining EPSS, KEV, and exposure:
| Tier | Criteria | Recommended SLA |
|---|---|---|
| Tier 1 | High EPSS + KEV + Internet-Facing | 72 hours |
| Tier 2 | High EPSS + Critical Asset | 7 days |
| Tier 3 | Medium EPSS + High CVSS | 14 days |
| Tier 4 | Low EPSS + Low Exposure | Risk-based |
Outcome: Aligns remediation timelines with real-world attack likelihood and impact.
Implementation Summary
| Vulnerability Management Stage | Traditional Approach | Exploitation-Aware Approach |
|---|---|---|
| Triage | CVSS-only classification | CVSS + EPSS at intake |
| Prioritisation | Static severity thresholds | Dynamic scoring (CVSS + EPSS + KEV) |
| Monitoring | Periodic review | Continuous EPSS updates |
| Remediation | Fixed SLA by severity | Risk-based SLA (EPSS + exposure) |
Implementation Note
EPSS does not replace CVSS or threat intelligence. It provides an additional signal, exploitation likelihood, that must be combined with:
๐ธ asset criticality
๐ธ exposure (e.g. internet-facing systems)
๐ธ business context
There is no universal EPSS threshold. Organisations should calibrate thresholds based on risk tolerance and remediation capacity.[2]
Key Takeaway
Effective vulnerability prioritisation requires integrating EPSS at multiple decision points not as a standalone score, but as part of a continuous, risk-based workflow.
The volume of disclosed vulnerabilities continues to rise faster than remediation capacity.[3] This makes severity-led patching increasingly ineffective.
EPSS introduces exploitation forecasting into vulnerability management, shifting patching from:
โ severity-led compliance activity
to
โ risk-led operational defence
CVSS remains essential, but it answers only one part of the risk question: impact severity.
EPSS adds the missing dimension - likelihood of attacker action.
Modern vulnerability programmes should treat CVSS as impact context, not patch priority alone. The most effective models combine:
๐ธ CVSS
๐ธ EPSS
๐ธ KEV
๐ธ threat intelligence
๐ธ asset exposure
๐ธ business criticality
This is the shift from theoretical severity management to real-world exploitation defence.
Strategic Context & Further Reading
๐ Vulnerability Management Reality: Operational Risk & Exposure-Based Prioritization
๐ Operational Threat Intelligence: Practical Guide for Security Teams
|
Reading Time: Approximately 15 minutes
Attribution Note
This analysis is based on publicly available reporting and security research summaries. Some technical details may change as additional information becomes available.
Timur Mehmet | Founder & Lead Editor
Timur is a veteran Information Security professional with a career spanning over three decades. Since the 1990s, he has led security initiatives across high-stakes sectors, including Finance, Telecommunications, Media, and Energy. Professional qualifications over the years have included CISSP, ISO27000 Auditor, ITIL and technologies such as Networking, Operating Systems, PKI, Firewalls. For more information including independent citations and credentials, visit our About page.
Contact:
This article adheres to Hackerstorm.com's commitment to accuracy, independence, and transparency:
Editorial Policy: Ethics, Non-Bias, Fact Checking and Corrections
Learn More: About Hackerstorm.com | FAQs
[1] FIRST.org - Exploit Prediction Scoring System (EPSS) Overview
https://www.first.org/epss/
[2] FIRST.org - EPSS Model Documentation
https://www.first.org/epss/model
[3] National Vulnerability Database (NVD) - Vulnerability Metrics and CVE Data
https://nvd.nist.gov/
[4] NIST NVD - CVSS Vulnerability Metrics Documentation
https://nvd.nist.gov/vuln-metrics/cvss
[5] CISA Known Exploited Vulnerabilities (KEV) Catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
[6] Citrix Security Bulletin - CVE-2023-4966 (Citrix Bleed) Advisory
https://support.citrix.com/article/CTX579459
[7] CISA Cybersecurity Advisory AA24-060B - Ivanti Connect Secure Exploitation
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
[8] FIRST EPSS Research Paper (ACM Digital Library)
https://dl.acm.org/doi/10.1145/3436242
[9] Volexity Threat Research - Ivanti Exploitation Analysis
https://www.volexity.com/
[10] Ivanti Security Advisory - CVE-2023-46805 / CVE-2024-21887
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-and-Policy-Secure-Gateways?language=en_US
COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.