Agentless security for your infrastructure and applications - to build faster, more securely and in a fraction of the operational cost of other solutions
hello@secopsolution.com
+569-231-213
An exploit Prediction Scoring System (EPSS) is used to estimate the probability that a vulnerability will be exploited in the system. It helps in prioritizing the vulnerability remediation efforts in conjunction with an existing CVSS score.
CVSS scoring system is used to identify vulnerability and on the basis of its characteristics they are classified into different severity levels but they are limited to assessing the threat while the EPSS fills the gap because it uses current threat information from the CVE database. The EPSS probability score is between 0 and 100 (in percentage) the higher the score of vulnerability the higher the chance of getting exploited.
For any company, it’s a big challenge to fix all vulnerabilities as there are too many vulnerabilities present, and from all this between 5% to 20% of vulnerabilities are actually fixed but in a network, only 2 to 5% of vulnerabilities are ever seen to be exploited. The EPSS scoring system uses the CVE data to identify the probability of exploitation of any vulnerability which helps the company not only prioritize vulnerability but also identify whether this vulnerability is going to be exploited in the wild.
CVE ID: CVE-2019-0708
Vulnerability Detail: A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
CVE ID: CVE-2019-5736
Vulnerability Detail: runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had to write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
CVE ID: CVE-2018-11776
Vulnerability Detail: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true and then: results are used with no namespace and at the same time, its upper package has no or wildcard namespace and similar to results, a same possibility when using URL tag which doesn't have value and action set and in the same time, its upper package have no or wildcard namespace.
Secops solution provides a free-to-use EPSS calculator enabling enterprises to fetch EPSS scores to prioritize their vulnerability remediation efforts.
SecOps Solution is an award-winning agent-less Full-stack Vulnerability and Patch Management Platform that helps organizations identify, prioritize and remediate security vulnerabilities and misconfigurations in seconds.
To schedule a demo, just pick a slot that is most convenient for you.