submitted by /u/ReynardSec[link][comments]
...moreTotal Articles Found: 24
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-12-29 13:42:33
Popularity: 147
Author: ReynardSec
submitted by /u/ReynardSec[link][comments]
...morePublished: 2024-11-26 07:40:44
Popularity: 14
Author: buherator
submitted by /u/buherator[link][comments]
...morePublished: 2025-01-14 16:44:06
Popularity: 41
Author: wifihack
submitted by /u/wifihack[link][comments]
...moresubmitted by /u/ranok[link][comments]
...morePublished: 2025-02-20 07:44:01
Popularity: 10
Author: dukeofmola
submitted by /u/dukeofmola[link][comments]
...morePublished: 2025-02-19 15:10:49
Popularity: 19
Author: toyojuni
submitted by /u/toyojuni[link][comments]
...morePublished: 2025-02-12 08:33:54
Popularity: 25
Author: albinowax
submitted by /u/albinowax[link][comments]
...morePublished: 2025-02-12 12:29:02
Popularity: 136
Author: AlmondOffSec
submitted by /u/AlmondOffSec[link][comments]
...morePublished: 2025-03-04 11:47:12
Popularity: 31
Author: sadyetfly11
submitted by /u/sadyetfly11[link][comments]
...morePublished: 2025-03-03 16:20:33
Popularity: 31
Author: rimdig219
submitted by /u/rimdig219[link][comments]
...morePublished: 2025-03-02 01:05:00
Popularity: 26
Author: campuscodi
submitted by /u/campuscodi[link][comments]
...morePublished: 2025-03-01 12:18:39
Popularity: 25
Author: pzduniak
submitted by /u/pzduniak[link][comments]
...morePublished: 2025-03-19 09:49:52
Popularity: 30
Author: SzLam__
submitted by /u/SzLam__[link][comments]
...morePublished: 2025-03-20 13:27:12
Popularity: 15
Author: Seaerkin2
submitted by /u/Seaerkin2[link][comments]
...morePublished: 2025-03-26 18:13:59
Popularity: 47
Author: small_talk101
submitted by /u/small_talk101[link][comments]
...morePublished: 2025-04-02 10:24:50
Popularity: 31
Author: techdash
submitted by /u/techdash[link][comments]
...morePublished: 2025-03-25 11:48:15
Popularity: 19
Author: albinowax
submitted by /u/albinowax[link][comments]
...morePublished: 2025-03-10 11:31:53
Popularity: 17
Author: citirix
submitted by /u/citirix[link][comments]
...morePublished: 2025-03-25 10:31:20
Popularity: 15
Author: oleavr
submitted by /u/oleavr[link][comments]
...morePublished: 2025-03-26 16:13:17
Popularity: 13
Author: IrohsLotusTile
submitted by /u/IrohsLotusTile[link][comments]
...morePublished: 2025-03-05 03:31:20
Popularity: 13
Author: skimfl925
I came across an interesting case that I wanted to share with r/netsec - it shows how traditional vulnerability scoring systems can fall short when prioritizing vulnerabilities that are actively being exploited.
The vulnerability: CVE-2024-50302
This vulnerability was just added to CISA's KEV (Known Exploited Vulnerabilities) catalog today, but if you were looking at standard metrics, you probably wouldn't have prioritized it:
Base CVSS: 5.5 (MEDIUM) CVSS-BT (with temporal): 5.5 (MEDIUM) EPSS Score: 0.04% (extremely low probability of exploitation)
But here's the kicker - despite these metrics, this vulnerability is actively being exploited in the wild.
Why standard vulnerability metrics let us down:
I've been frustrated with vulnerability management for a while, and this example hits on three problems I consistently see:
A weekend project: Threat-enhanced scoring
As a side project, I've been tinkering with an enhanced scoring algorithm that incorporates threat intel sources to provide a more practical risk score. I'm calling it CVSS-TE.
For this specific vulnerability, here's what it showed:
Before CISA KEV addition: - Base CVSS: 5.5 (MEDIUM) - CVSS-BT: 5.5 (MEDIUM) - CVSS-TE: 7.0 (HIGH) - Already elevated due to VulnCheck KEV data - Indicators: VulnCheck KEV
After CISA KEV addition: - Base CVSS: 5.5 (MEDIUM) - CVSS-BT: 5.5 (MEDIUM) - CVSS-TE: 7.5 (HIGH) - Further increased - Indicators: CISA KEV + VulnCheck KEV
Technical implementation
Since this is r/netsec, I figure some of you might be interested in how I approached this:
The algorithm: 1. Uses standard CVSS-BT score as a baseline 2. Applies a quality multiplier based on exploit reliability and effectiveness data 3. Adds threat intelligence factors from various sources (CISA KEV, VulnCheck, EPSS, exploit count) 4. Uses a weighted formula to prevent dilution of high-quality exploits
The basic formula is: CVSS-TE = min(10, CVSS-BT_Score * Quality_Multiplier + Threat_Intel_Factor - Time_Decay)
Threat intel factors are weighted roughly like this: - CISA KEV presence: +1.0 - VulnCheck KEV presence: +0.8 - High EPSS (β₯0.5): +0.5 - Multiple exploit sources present: +0.25 to +0.75 based on count
The interesting part
What makes this vulnerability particularly interesting is the contrast between its EPSS score (0.04%, which is tiny) and the fact that it's being actively exploited. This is exactly the kind of case that probability-based models can miss.
For me, it's a validation that augmenting traditional scores with actual threat intel can catch things that might otherwise slip through the cracks.
I made a thing
I built a small lookup tool at github.io/cvss-te where you can search for CVEs and see how they score with this approach.
The code and methodology is on GitHub if anyone wants to take a look. It's just a weekend project, so there's plenty of room for improvement - would appreciate any feedback or suggestions from the community.
Anyone else run into similar issues with standard vulnerability metrics? Or have alternative approaches you've found useful?ββββββββββββββββ
submitted by /u/skimfl925
[link][comments]
Published: 2025-03-06 09:55:54
Popularity: 12
Author: Longjumping-Top2717
submitted by /u/Longjumping-Top2717[link][comments]
...morePublished: 2025-03-31 13:08:25
Popularity: 61
Author: Fugitif
submitted by /u/Fugitif[link][comments]
...morePublished: 2025-04-01 22:51:37
Popularity: 11
Author: nathan_warlocks
submitted by /u/nathan_warlocks[link][comments]
...more