Vulnerability Management
Vulnerability Management
PAPER
As organizations transform their enterprises and move to a remote-work model in response to COVID-19,
cybersecurity professionals are facing a sudden expansion of their attack surface. In addition to the risk
presented by ever-increasing numbers and types of devices and technologies, such as cloud-based
applications, software-defined networks, and operational technology, personal devices) continue to alter
and increase the attack surface. In a recent survey, 67% of IT professionals reported that remote workers’
use of their own devices to access business applications and IT infrastructure decreased their firms’ security
posture. Further, smart phones, laptops, and mobile devices are the most vulnerable endpoints or entry
points to organizations’ networks and enterprise systems.1
As the attack surface increases, so do the number of vulnerabilities your organization is exposed to, which
threat actors are quick to exploit. Vulnerability management teams need to be constantly vigilant and ready
to act. However, with more potential points of entry, it’s all but impossible to catch all vulnerabilities, let alone
prioritize and remediate them in a timely manner. There’s no disputing that unpatched vulnerabilities make
systems easy prey. Any yet, failure to patch remains a major problem. Industry research, for example, reveals
that 60% of breaches were linked to a vulnerability where a patch was available but not applied, up from 57%
the prior year.2 Further, an analysis of 2,013 data breaches shows that more than half (52%) involved some
form of hacking. Of the most prominent hacking variety and vector combinations, ‘vulnerability exploitation’
made the top three.3
The delay between a vulnerability’s first occurrence and its initial publication in the NVD is problematic because
it makes it difficult for vulnerability management teams to understand which areas of their environment are at
risk. Further, they often struggle to keep track of which vulnerabilities have and haven’t been patched–leaving
dangerous openings for attackers to strike. Industry research backs this up, reporting that the majority (75%)
of IT security professionals can’t easily track whether vulnerabilities are being patched in a timely manner.4
1 Ponemon Institute LLC, Cybersecurity in the Remote Work Era: A Global Risk Report, October 2020.
2 Ponemon Institute, LLC, Costs and Consequences of Gaps in Vulnerability Response, April 2018.
3 Verizon Enterprise Solutions, 2020 Data Breach Investigations Report, May 2019.
4 Ponemon Institute, LLC, Costs and Consequences of Gaps in Vulnerability Response, April 2018.
Beyond increasing threat severity, threat actors have gotten faster at exploiting vulnerabilities, leaving IT
security teams facing a ticking clock when it comes to remediation. Today, it takes about 15 days for an exploit
to appear in the wild once a vulnerability is identified. This means that security teams have only about two
weeks to patch or remediate a system against a new vulnerability. Unfortunately, IT security professionals
continue to be challenged in this area, with 72% reporting difficulty in prioritizing what needs to be patched,
up from 65% the prior year.5
With new vulnerabilities being discovered in increasing velocity and volume, scanning tools are returning
hundreds, if not thousands–or tens of thousands–of vulnerabilities. It goes without saying that the prospect
of quickly remediating every vulnerability identified by a scan is unfeasible. Overwhelmed and already
stretched too thin to fix each one, most vulnerability management teams simply prioritize patching based
on the CVSS severity levels.
Lastly, organizations can modify the Base Score with an Environment Score, which provides a customized
metric specific to a business environment. However, many organizations lack the bandwidth to do so.
5 Ponemon Institute, LLC, Costs and Consequences of Gaps in Vulnerability Response, April 2018.
Because businesses lack the resources to patch or mitigate everything, it is vital to focus on reducing the
most risk possible. The key to vulnerability management is thus the ability to assess the level of risk that
vulnerabilities pose to the business. To provide threat-driven, risk-based vulnerability management, IT
security teams should factor in the following when prioritizing remediation efforts:
The better the assessment, the better able you’ll be able to prioritize the effort to remediate individual
vulnerabilities that score above the business risk appetite.
IT security teams are continuously faced with the challenge of keeping up with countless patch updates
without knowing which vulnerabilities are actually being exploited by threat actors. The missing link is
the overlap between the vulnerabilities in the systems being used and the ones that are actively being
exploited. This information can help you prioritize resources to make informed, data-driven decisions on
remediating systems.
Static Base Scores: CVSS scores fail to reflect the current threat landscape. The Base Score is typically
assigned within two weeks of the vulnerability being discovered and is almost never revisited after
the initial assessment–even if circumstances or the threat landscape changes. That means that if a
vulnerability was initially assigned a Base Score of 5.0, it will remain at the initial 5.0 – even if several
months later it’s successfully exploited in the wild and even if it becomes a prolifically exploited
vulnerability that causes widespread damage.
Assumption of Widespread Exploitation: Temporal Scores are designed to lower the Base Score by
addressing whether threat actors are actively weaponizing the vulnerability and the likelihood of active
exploits. If considered at all, the default value of the Exploit Code Maturity metric in the Temporal Score
assumes widespread exploitation, which is unrealistic. Since more than 75% of all vulnerabilities with a
score of seven or above have never had an exploit published against them, security teams using CVSS
to prioritize efforts are wasting the majority of their time chasing after the wrong issues.
Failure to Consider Relationships Between Vulnerabilities: CVSS does not consider relationships between
vulnerabilities that allow threat actors to pivot or to escalate privileges. Nor does it consider issues that are
not strictly defined as vulnerabilities, such as insecure misconfigurations. These both play a role in evaluating
the risk status and prioritizing response.
Lack of Critical Business Context: CVSS scores are subjective. Unless the organization modifies the Base
Score with an Environmental Score, it fails to consider critical context around the assets that the vulnerability
is exposing. When it comes to using the CVSS score to prioritize remediation efforts, time and time again,
vulnerabilities with CVSS scores ranging from 7 to 10 are given top priority, even if the affected assets would
only cause minimal impact to the business if compromised. Meanwhile, vulnerabilities with CVSS scores of
5 sit lower on the priority list even though they could expose high-value assets and targeted exploits are
actively being weaponized.
Official vulnerability databases, even conventional scanning tools, cannot arm you with the one key metric
necessary to prioritize remediation: the overlap between the vulnerabilities in your systems and the ones
being actively exploited by threat actors. Because less than 1% of vulnerabilities have been weaponized
within the past month–or year–insight into weaponization is essential to adequately prioritize which
vulnerabilities to patch.
Vulnerability intelligence should not simply provide more information in the form of scores and statistics,
but rather a deeper understanding of how and why threat actors are targeting certain vulnerabilities and
ignoring others. By combining your company’s internal asset criticality and internal vulnerability scanning data
with external intelligence from various sources, IT security teams can assess the true risk of a vulnerability
to the organization and strike the correct balance between patching vulnerable systems and interrupting
business operations.
This diagram shows all of the inputs and data points that lead to risk-based patch prioritization.
Summary
There’s a new vulnerability for every day of the week. Yet, severity ratings don’t tell the full story and
vulnerability databases can’t publish fast enough to enable proactive response. Data from asset
scans and external vulnerability databases are only the starting points for generating intelligence that
enables you to assess the risk of vulnerabilities. Unless vulnerability intelligence includes data from a
wide range and variety of sources, you risk missing emerging vulnerabilities until it’s too late. True risk-
based vulnerability management goes beyond assessing risk based on CVSS scores. It requires looking
at internal risk criticality while monitoring external threat trends and vulnerability weaponization that
continuously change the risk landscape.
In deciding what to address first, you must weigh the balance between the likely impact of a vulnerability
being exploited against the potential operational impact of remediating. This is most effectively achieved
by combining internal data from vulnerability scanning and asset criticality with contextualized external
intelligence to reveal whether internal vulnerabilities are actually being exploited. By taking a risk-based
approach to vulnerability management, you can address the organization’s true business risk and focus on
the vulnerabilities and assets that matter most.
Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis,
Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they
need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded
Future is trusted by more than 1,000 businesses and government organizations around the world.
www.recordedfuture.com @RecordedFuture
© Recorded Future®, Inc. All rights reserved. All trademarks remain property of their respective owners.