Skip to content

Commit

Permalink
EPSS changes (#271)
Browse files Browse the repository at this point in the history
Update EPSS info and references
  • Loading branch information
laurie-tyz authored Jul 11, 2023
1 parent 0c5589f commit 5b8d4e6
Show file tree
Hide file tree
Showing 3 changed files with 23 additions and 14 deletions.
2 changes: 1 addition & 1 deletion doc/md_src_files/05_01_exploitation.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
## Exploitation
> Evidence of Active Exploitation of a Vulnerability
The intent of this measure is the present state of exploitation of the vulnerability. The intent is not to predict future exploitation but only to acknowledge the current state of affairs. Predictive systems, such as EPSS, could be used to augment this decision or to notify stakeholders of likely changes [@jacobs2019exploit].
The intent of this measure is the present state of exploitation of the vulnerability. The intent is not to predict future exploitation but only to acknowledge the current state of affairs. Predictive systems, such as EPSS, could be used to augment this decision or to notify stakeholders of likely changes [@jacobs2021epss].

Table: Exploitation Decision Values

Expand Down
10 changes: 5 additions & 5 deletions doc/md_src_files/12_related_systems.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Related Vulnerability Management Systems

There are several other bodies of work that are used in practice to assist vulnerability managers in making decisions.
Three relevant systems are CVSS [@cvss_v3-1], EPSS [@jacobs2019exploit], and Tenable's Vulnerability Priority Rating ([VPR](https://www.tenable.com/blog/what-is-vpr-and-how-is-it-different-from-cvss)).
Three relevant systems are CVSS [@cvss_v3-1], EPSS [@jacobs2021epss], and Tenable's Vulnerability Priority Rating ([VPR](https://www.tenable.com/blog/what-is-vpr-and-how-is-it-different-from-cvss)).
There are other systems derived from CVSS, such as RVSS for robots [@vilches2018towards] and MITRE's effort to adapt CVSS to medical devices [@mitre2019medical].
There are also other nascent efforts to automate aspects of the decision making process, such as [vPrioritizer](https://github.com/varchashva/vPrioritizer).
This section discusses the relationship between these various systems and SSVC.
Expand Down Expand Up @@ -64,7 +64,7 @@ In SSVC, these definitions are in the [Scope](#scope) section.
The temporal metric group primarily contains the Exploit Code Maturity metric.
This metric expresses a concept similar to [*Exploitation*](#exploitation).
The main difference is that [*Exploitation*](#exploitation) is not optional in SSVC and that SSVC accounts for the observation that most vulnerabilities with CVE-IDs do not have public exploit code [@householder2020historical] and are not actively exploited [@guido2011exploit,@jacobs2019exploit].
The main difference is that [*Exploitation*](#exploitation) is not optional in SSVC and that SSVC accounts for the observation that most vulnerabilities with CVE-IDs do not have public exploit code [@householder2020historical] and are not actively exploited [@guido2011exploit,@jacobs2021epss].

> Environmental metric group
Expand All @@ -75,14 +75,14 @@ SSVC does not have such customization as a bolt-on optional metric group because

## EPSS

[EPSS](https://www.first.org/epss/) is an “effort for predicting when software vulnerabilities will be exploited.”
EPSS is currently based on a machine-learning classifier and proprietary IDS alert data from Kenna Security.
The [Exploit Prediction Scoring System (EPSS)](https://www.first.org/epss/) is “a data-driven effort for estimating the likelihood (probability) that a software vulnerability will be exploited in the wild.”
EPSS is currently based on a machine-learning classifier and proprietary data from Fortiguard, Alienvault OTX, the Shadowserver Foundation and GreyNoise.
While the group has made an effort to make the ML classifier transparent, ML classifiers are not able to provide an intelligible, human-accessible explanation for their behavior [@spring2019ml].
The use of proprietary training data makes the system less transparent.

EPSS could be used to inform the [*Exploitation*](#exploitation) decision point.
Currently, [*Exploitation*](#exploitation) focuses on the observable state of the world at the time of the SSVC decision.
EPSS is about predicting if a transition will occur from the SSVC state of [*none*](#xploitation) to [*active*](#exploitation).
EPSS is about predicting if a transition will occur from the SSVC state of [*none*](#exploitation) to [*active*](#exploitation).
A sufficiently high EPSS score could therefore be used as an additional criterion for scoring a vulnerability as [*active*](#exploitation) even when there is no observed active exploitation.

## VPR
Expand Down
25 changes: 17 additions & 8 deletions doc/md_src_files/sources_ssvc.bib
Original file line number Diff line number Diff line change
Expand Up @@ -206,13 +206,23 @@ @inproceedings{spring2015global
organization={IEEE}
}

@inproceedings{jacobs2019exploit,
title={Exploit Prediction Scoring System ({EPSS})},
author={Jacobs, Jay and Romanosky, Sasha and Edwards, Benjamin and Roytman, Michael and Adjerid, Idris},
booktitle = {Workshop on the Economics of Information Security},
address = {Boston, MA},
date={2019-06},
url = {https://arxiv.org/abs/1908.04856}
@article{jacobs2021epss,
author = {Jacobs, Jay and Romanosky, Sasha and Edwards, Benjamin and Adjerid, Idris and Roytman, Michael},
title = {Exploit Prediction Scoring System (EPSS)},
year = {2021},
issue_date = {September 2021},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {2},
number = {3},
issn = {2692-1626},
url = {https://doi.org/10.1145/3436242},
doi = {10.1145/3436242},
journal = {Digital Threats},
month = {Jul},
articleno = {20},
numpages = {17},
keywords = {EPSS, Vulnerability management, machine learning, vulnerability exploits}
}

@inproceedings{householder2020historical,
Expand Down Expand Up @@ -386,7 +396,6 @@ @online{captera
url = {https://www.capterra.com/it-asset-management-software/}
}


%%%% End miscellaneous online resources
%%%% CVSS publications
Expand Down

0 comments on commit 5b8d4e6

Please sign in to comment.