Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
133 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Measuring the Exploitation of Weaknesses in the Wild (2405.01289v1)

Published 2 May 2024 in cs.CR

Abstract: Identifying the software weaknesses exploited by attacks supports efforts to reduce developer introduction of vulnerabilities and to guide security code review efforts. A weakness is a bug or fault type that can be exploited through an operation that results in a security-relevant error. Ideally, the security community would measure the prevalence of the software weaknesses used in actual exploitation. This work advances that goal by introducing a simple metric that utilizes public data feeds to determine the probability of a weakness being exploited in the wild for any 30-day window. The metric is evaluated on a set of 130 weaknesses that were commonly found in vulnerabilities between April 2021 and March 2024. Our analysis reveals that 92 % of the weaknesses are not being constantly exploited.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (9)
  1. Cyentia (2018) Prioritization to Prediction: Analyzing Vulnerability Remediation Strategies
  2. MITRE (2023) Common Vulnerabilities and Exposures. Available at https://www.cve.org/
  3. MITRE (2023) Common Weakness Enumeration. Available at https://cwe.mitre.org
  4. National Institute of Standards and Technology (2023) National Vulnerability Database. Available at https://nvd.nist.gov/
  5. Forum of Incident Response and Security Teams (2015) Common Vulnerability Scoring System version 3.1: Specification Document. Available at https://www.first.org/cvss/v3-1/cvss-v31-specification_r1.pdf
  6. MITRE (2023) Weaknesses for Simplified Mapping of Published Vulnerabilities. Available at https://cwe.mitre.org/data/definitions/1003.html
  7. Forum of Incident Response and Security Teams (2023) Exploit Prediction Scoring System. Available at https://www.first.org/epss/
  8. Forum of Incident Response and Security Teams (2023) Exploit Prediction Scoring System Model. Available at https://first.org/epss/model
  9. MITRE (2023) CWE Top 25 Most Dangerous Software Weaknesses. Available at https://cwe.mitre.org/top25
Citations (1)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com