{"id":24403,"date":"2025-07-22T23:47:33","date_gmt":"2025-07-22T19:47:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/24403\/"},"modified":"2025-07-22T23:47:33","modified_gmt":"2025-07-22T19:47:33","slug":"cvss-rbvm-vulnerability-management","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/24403\/","title":{"rendered":"From CVSS to RBVM: vulnerability prioritization done right"},"content":{"rendered":"<p>When you <a href=\"https:\/\/www.kaspersky.com\/blog\/cvss-4-base-evolution\/53825\/\" target=\"_blank\" rel=\"noopener nofollow\">first encounter CVSS<\/a> (Common Vulnerability Scoring System), it\u2019s easy to think this is the perfect tool for triaging and prioritizing vulnerabilities. A higher score must mean a more critical vulnerability, right? In reality, that approach doesn\u2019t quite work out. Every year, we see an increasing number of vulnerabilities with high CVSS scores. Security teams just can\u2019t patch them all in time, but the vast majority of these flaws are never actually exploited in real-world attacks. Meanwhile, attackers are constantly leveraging less flashy vulnerabilities with lower scores. There are other hidden pitfalls too \u2014 ranging from purely technical issues like conflicting CVSS scores to conceptual ones like a lack of business context.<\/p>\n<p>These aren\u2019t necessarily shortcomings of the CVSS itself. Instead, this highlights the need to use the tool correctly, as part of a more sophisticated and comprehensive vulnerability management process.<\/p>\n<h2>CVSS discrepancies<\/h2>\n<p>Do you ever notice how the same vulnerability might have different severity scores depending on the available source? One score from the cybersecurity researcher who found it, another from the vendor of the vulnerable software, and yet another from a national vulnerability database? It\u2019s not always just a simple mistake. Sometimes, different experts can disagree on the context of exploitation. They might have different ideas about the privileges with which a vulnerable application runs, or whether it\u2019s internet-facing. For instance, a vendor might base its assessment on its recommended best practices, while a security researcher might consider how applications are typically configured in real-world organizations. One researcher might rate the exploit complexity as high, while another deems it low. This isn\u2019t an uncommon occurrence. A 2023 <a href=\"https:\/\/vulncheck.com\/blog\/cvss-accuracy-issues\" target=\"_blank\" rel=\"nofollow noopener\">study by Vulncheck<\/a> found that 20% of vulnerabilities in the National Vulnerability Database (NVD) had two CVSS3 scores from different sources, and 56% of those paired scores were in conflict with each other.<\/p>\n<h2>Common mistakes when using CVSS<\/h2>\n<p>For over a decade, <a href=\"https:\/\/www.first.org\/about\/mission\" target=\"_blank\" rel=\"nofollow noopener\">FIRST<\/a> has advocated for the methodologically correct application of CVSS. Yet organizations that use CVSS ratings in their vulnerability management processes continue to make typical mistakes:<\/p>\n<ol>\n<li>Using the CVSS base score as the primary risk indicator. CVSS measures the severity of a vulnerability \u2014 not when it will be exploited or the potential impact of its exploitation on the organization under attack. Sometimes, a critical vulnerability is harmless within a specific company\u2019s environment because it resides in insignificant and isolated systems. Conversely, a large-scale ransomware attack might begin with a seemingly innocuous information leak vulnerability with a CVSS score of 6.<\/li>\n<li>Using the CVSS Base score without Threat\/Temporal and Environmental adjustments. The availability of patches, public exploits, and compensatory measures significantly influences how and how urgently a vulnerability should be addressed.<\/li>\n<li>Focusing only on vulnerabilities above a certain score. This approach is sometimes mandated by government or industry regulators (\u201cremediate vulnerabilities with CVSS score above 8 within one month\u201d). As a result, cybersecurity teams face a continuously growing workload that, in reality, doesn\u2019t make their infrastructure more secure. The number of vulnerabilities with high CVSS scores identified annually has been <a href=\"https:\/\/nvd.nist.gov\/general\/visualizations\/vulnerability-visualizations\/cvss-severity-distribution-over-time#CVSSSeverityOverTime\" target=\"_blank\" rel=\"nofollow noopener\">rapidly increasing over the past 10 years<\/a>.<\/li>\n<li>Using CVSS to assess the likelihood of exploitation. These metrics are poorly correlated: only <a href=\"https:\/\/vulmon.com\/docs\/Vulnerability-Scoring\/KEV\" target=\"_blank\" rel=\"nofollow noopener\">17% of critical vulnerabilities<\/a> are ever exploited in attacks.<\/li>\n<li>Using only the CVSS rating. The standardized vector string was introduced in CVSS so that defenders could understand the details of a vulnerability and independently calculate its importance within their own organization. CVSS 4.0 was specifically revised to make it easier to account for business context using additional metrics. Any vulnerability management efforts based solely on a numerical rating will largely be ineffective.<\/li>\n<li>Ignoring additional sources of information. Relying on a single vulnerability database and analyzing only CVSS is insufficient. The absence of data on patches, working proofs of concept, and real-world exploitation cases makes it difficult to decide how to address vulnerabilities.<\/li>\n<\/ol>\n<h2>What CVSS doesn\u2019t tell you about a vulnerability<\/h2>\n<p>CVSS is the industry standard for describing a vulnerability\u2019s severity, the conditions under which it can be exploited, and its potential impact on a vulnerable system. However, beyond this description (and the CVSS Base score), there\u2019s a lot it doesn\u2019t cover:<\/p>\n<ul>\n<li>Who found the vulnerability? Was it the vendor, an ethical researcher who reported the flaw and waited for a patch, or was it a malicious actor?<\/li>\n<li>Is there an exploit publicly available? In other words, is there readily available code to exploit the vulnerability?<\/li>\n<li>How practical is it to exploit in real-world scenarios?<\/li>\n<li>Is there a patch? Does it cover all vulnerable software versions, and what are the potential side effects of applying it?<\/li>\n<li>Should the organization address the vulnerability? Or does it affect a cloud service (SaaS) where the provider will automatically fix the defects?<\/li>\n<li>Are there signs of exploitation in the wild?<\/li>\n<li>If there are none, what\u2019s the likelihood attackers will leverage this vulnerability in the future?<\/li>\n<li>Which specific systems within your organization are vulnerable?<\/li>\n<li>Is the exploitation practically accessible to an attacker? For example, a system might be a corporate web server accessible to anyone online, or it could be a vulnerable printer physically connected to a single computer that has no network access. A more complex example might be a vulnerability in a software component\u2019s method, where the specific business application using that component never actually calls the method.<\/li>\n<li>What would happen if the vulnerable systems were compromised?<\/li>\n<li>What\u2019s the financial cost of such an event to the business?<\/li>\n<\/ul>\n<p>All these factors significantly influence the decision of when and how to remediate a vulnerability \u2014 or even if remediation is necessary at all.<\/p>\n<h2>How to amend CVSS? RBVM has the answer!<\/h2>\n<p>Many factors that are often hard to account for within the confines of CVSS are central to a popular approach known as risk-based vulnerability management (RBVM).<\/p>\n<p>RBVM is a holistic, cyclical process, with several key phases that repeat regularly:<\/p>\n<ul>\n<li>Inventorying all IT assets of your business. This includes everything from computers, servers and software, to cloud services and IoT devices.<\/li>\n<li>Prioritizing assets by importance: identifying your crown jewels.<\/li>\n<li>Scanning assets for known vulnerabilities.<\/li>\n<li>Enriching the vulnerability data. This includes refining CVSS-B and CVSS-BT ratings, incorporating threat intelligence, and assessing the likelihood of exploitation. Two popular tools for gauging exploitability are <a href=\"https:\/\/www.first.org\/epss\/data_stats.html\" target=\"_blank\" rel=\"nofollow noopener\">EPSS<\/a> (another FIRST rating that provides a percentage probability of real-world exploitation for most vulnerabilities), and consulting databases like <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener\">CISA KEV<\/a>, which contains information about vulnerabilities actively exploited by attackers.<\/li>\n<li>Defining the business context: understanding the potential impact of an exploit on vulnerable systems, considering their configurations and how they\u2019re used within your organization.<\/li>\n<li>Determining how the vulnerability can be neutralized through either patches or compensatory measures.<\/li>\n<li>The most exciting part: assessing the business risk and setting priorities based on all the gathered data. Vulnerabilities with the highest probability of exploitation and possible significant impact on your key IT assets are prioritized. To rank vulnerabilities, you can either calculate CVSS-BTE \u2014 incorporating all collected data into the Environmental component, or use alternative ranking methodologies. Regulatory aspects also influence prioritization.<\/li>\n<li>Setting deadlines for each vulnerability\u2019s resolution based on its risk level and operational considerations, such as the most convenient time for updates. If updates or patches aren\u2019t available, or if their implementation introduces new risks and complexities, compensatory measures are adopted instead of direct remediation. Sometimes, the cost of fixing a vulnerability outweighs the risk it poses, and a decision might be made not to remediate it at all. In such cases, the business consciously accepts the risks of the vulnerability being exploited.<\/li>\n<\/ul>\n<p>In addition to what we\u2019ve discussed, it\u2019s crucial to periodically analyze your company\u2019s vulnerability landscape and IT infrastructure. Following this analysis, you need to introduce cybersecurity measures that prevent entire classes of vulnerabilities from being exploited or significantly boost the overall security of specific IT systems. These measures can include network micro-segmentation, least privilege implementation, and adopting stricter account management policies.<\/p>\n<p>A properly implemented RBVM process drastically reduces the burden on IT and security teams. They spend their time more effectively as their efforts are primarily directed at flaws that pose a genuine threat to the business. To grasp the scale of these efficiency gains and resource savings, consider this <a href=\"https:\/\/www.first.org\/epss\/model\" target=\"_blank\" rel=\"nofollow noopener\">FIRST study<\/a>. Prioritizing vulnerabilities using EPSS alone allows you to focus on just 3% of vulnerabilities while achieving 65% efficiency. In stark contrast, prioritizing by CVSS-B requires addressing a whopping 57% of vulnerabilities with a dismal 4% effectiveness. Here, \u201cefficiency\u201d refers to successful remediation of vulnerabilities that have actually been exploited in the wild.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaspersky-next\">\n","protected":false},"excerpt":{"rendered":"<p>Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.<\/p>\n","protected":false},"author":2722,"featured_media":24404,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[2088,1948,2843,398,2494,268],"class_list":{"0":"post-24403","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-tips","11":"tag-ciso","12":"tag-cvss","13":"tag-patches","14":"tag-strategy","15":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/24403\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cvss-rbvm-vulnerability-management\/29225\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/12606\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cvss-rbvm-vulnerability-management\/29236\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/28339\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cvss-rbvm-vulnerability-management\/31177\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cvss-rbvm-vulnerability-management\/29856\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cvss-rbvm-vulnerability-management\/40090\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cvss-rbvm-vulnerability-management\/13591\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/53912\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cvss-rbvm-vulnerability-management\/22997\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cvss-rbvm-vulnerability-management\/24033\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cvss-rbvm-vulnerability-management\/32454\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cvss-rbvm-vulnerability-management\/29382\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cvss-rbvm-vulnerability-management\/35159\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cvss-rbvm-vulnerability-management\/34799\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24403"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24404"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}