SecScore: Enhancing the CVSS Threat Metric Group with Empirical Evidences (2405.08539v1)
Abstract: Background: Timely prioritising and remediating vulnerabilities are paramount in the dynamic cybersecurity field, and one of the most widely used vulnerability scoring systems (CVSS) does not address the increasing likelihood of emerging an exploit code. Aims: We present SecScore, an innovative vulnerability severity score that enhances CVSS Threat metric group with statistical models from empirical evidences of real-world exploit codes. Method: SecScore adjusts the traditional CVSS score using an explainable and empirical method that more accurately and promptly captures the dynamics of exploit code development. Results: Our approach can integrate seamlessly into the assessment/prioritisation stage of several vulnerability management processes, improving the effectiveness of prioritisation and ensuring timely remediation. We provide real-world statistical analysis and models for a wide range of vulnerability types and platforms, demonstrating that SecScore is flexible according to the vulnerability's profile. Comprehensive experiments validate the value and timeliness of SecScore in vulnerability prioritisation. Conclusions: SecScore advances the vulnerability metrics theory and enhances organisational cybersecurity with practical insights.
- STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles. Computers & Security 133 (2023), 103391. https://doi.org/10.1016/j.cose.2023.103391
- A framework for designing vulnerability metrics. Computers & Security 132 (2023), 103382. https://doi.org/10.1016/j.cose.2023.103382
- Luca Allodi. 2015. The Heavy Tails of Vulnerability Exploitation. Proc. of the International Symposium on Engineering Secure Software and Systems (ESSOS), 133–148. https://doi.org/10.1007/978-3-319-15618-7_11
- Team Ascend. 2019. The Five Stages of Vulnerability Management. https://blog.teamascend.com/stages-of-vulnerability-management.
- Nick Cavalancia. 2020. Vulnerability management explained. https://cybersecurity.att.com/blogs/security-essentials/vulnerability-management-explained.
- Using Twitter to Predict When Vulnerabilities Will Be Exploited. In Proc. of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD). 3143–3152. https://doi.org/10.1145/3292500.3330742
- A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. IEEE Transactions on Network and Service Management (TNSM) (2023), 1–1. https://doi.org/10.1109/TNSM.2023.3234554
- FIRST—Forum of Incident Response and Security Teams, Inc. 2023a. Common Vulnerability Scoring System (CVSS). https://www.first.org/cvss/
- FIRST—Forum of Incident Response and Security Teams, Inc. 2023b. Exploit Prediction Scoring System (EPSS). https://www.first.org/epss/
- FIRST—Forum of Incident Response and Security Teams, Inc. 2024. Common Vulnerability Scoring System version 4.0 Specification Document - Version: 1.1. https://www.first.org/cvss/v4-0/cvss-v40-specification.pdf
- Center for Disease Control and Prevention. 2021. Vulnerability Management Life Cycle. https://www.cdc.gov/cancer/npcr/tools/security/vmlc.htm.
- Park Foreman. 2019. Vulnerability Management. CRC Press.
- Jonathan Greig. 2021. With 18,378 vulnerabilities reported in 2021, NIST records fifth straight year of record numbers. https://www.zdnet.com/article/with-18376-vulnerabilities-found-in-2021-nist-reports-fifth-straight-year-of-record-numbers/.
- Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. IEEE Transactions on Dependable and Secure Computing (TDSC) 20, 2 (2023), 1270–1285. https://doi.org/10.1109/TDSC.2022.3152164
- Historical Analysis of Exploit Availability Timelines. In Proc. of the 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET). https://www.usenix.org/conference/cset20/presentation/householder
- Henry Howland. 2021. CVSS: Ubiquitous and Broken. Digital Threats: Research and Practice (2021). https://doi.org/10.1145/3491263
- Sam Humphries. 2020. 4 Stages of Vulnerability Management: A Process for Risk Mitigation. https://www.exabeam.com/information-security/vulnerability-management/.
- Improving vulnerability remediation through better exploit prediction. Journal of Cybersecurity 6 (1 2020). Issue 1. https://doi.org/10.1093/cybsec/tyaa015
- Exploit Prediction Scoring System (EPSS). Digital Threats: Research and Practice 2 (7 2021), 1–17. Issue 3. https://doi.org/10.1145/3436242
- Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. In Proc. of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 194–206. https://doi.org/10.1109/EuroSPW59978.2023.00027
- Tomasz J Kozubowski and Krzysztof Podgórski. 2000. A multivariate and asymmetric generalization of Laplace distribution. Computational Statistics 15 (2000), 531–540. https://doi.org/10.1007/PL00022717
- Common vulnerability scoring system prediction based on open source intelligence information sources. Computers & Security 131 (2023), 103286. https://doi.org/10.1016/j.cose.2023.103286
- Information Technology Laboratory. 2021. CVSS Severity Distribution Over Time. https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-distribution-over-time.
- Takashi Minohara and Masaya Shimakawa. 2023. Security Risk Growth Models for Software Vulnerability Assessment. In Proc. of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 32–35. https://doi.org/10.1109/DSN-W58399.2023.00026
- Forum of Incident Response and Security Teams. 2005. Complete CVSS v1 Guide. https://www.first.org/cvss/v1/guide.
- Forum of Incident Response and Security Teams. 2019. Common Vulnerability Scoring System v3.1: Specification Document. https://www.first.org/cvss/v3.1/specification-document.
- University of Miami. [n. d.]. Vulnerability Management. https://web.archive.org/web/20230920064111/https://security.it.miami.edu/services/vulnerability-management/index.html.
- OffSec Services Limited. 2023. Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers. https://www.exploit-db.com/.
- Pyxyp Inc. 2023. VulDB - Vulnerability Database. https://vuldb.com/
- Rapid7. [n. d.]. Vulnerability Management Process: Scanning, Prioritizing, and Remediating. https://www.rapid7.com/fundamentals/vulnerability-management-and-scanning/.
- OffSec Offensive Security. 2023. ExploitDB - The official Exploit-Database repository. https://gitlab.com/exploit-database/exploitdb.
- SecurityScorecard, Inc. 2023. CVE security vulnerability database. https://www.cvedetails.com/
- A hybrid scoring system for prioritization of software vulnerabilities. Computers & Security 129 (2023), 103256. https://doi.org/10.1016/j.cose.2023.103256
- Time to Change the CVSS? IEEE Security & Privacy 19, 2 (2021), 74–78. https://doi.org/10.1109/MSEC.2020.3044475
- Towards Improving CVSS. Technical Report. Carnegie Mellon University.
- The who, what, how of software engineering research: a socio-technical framework. Empirical Software Engineering 25 (2020), 4097–4129. https://doi.org/10.1007/s10664-020-09858-z
- Tenable. 2020a. How to Implement Risk-based Vulnerability Management. Technical Report. Tenable, Inc. 1–10 pages.
- Tenable. 2020b. Risk-based Vulnerability Management: Focus On The Vulnerabilities That Pose The Greatest Risk. Technical Report. Tenable, Inc. 1–14 pages.
- Tenable. 2020c. Your Answer to the Vulnerability Overload Problem: Risk-based Vulnerability Management. Technical Report. Tenable, Inc. 1–2 pages.
- The MITRE Corporation. 2023. Common Vulnerabilities and Exposures (CVE). https://www.cve.org
- Fordham University. 2021. Vulnerability Management Procedure. https://www.fordham.edu/info/29071/vulnerability_management_procedure.
- Intrusion-Tolerant Architectures: Concepts and Design. In Architecting Dependable Systems, Rogério de Lemos, Cristina Gacek, and Alexander Romanovsky (Eds.). Springer, 3–36. https://doi.org/10.1007/3-540-45177-3_1
- Vulcan. 2019. Vulnerability Management 2020: Navigating to New Heights. Technical Report. Vulcan Cyber Ltd. 1–10 pages. https://www.bitpipe.com/detail/RES/1589403842_44.html
- Michał Walkowski. 2022. VMC (OWASP Vulnerability Management Center). https://github.com/DSecureMe/vmc.
- LICALITY—Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. IEEE Transactions on Network and Service Management (TNSM) 19, 2 (2022), 1746–1760. https://doi.org/10.1109/TNSM.2021.3133811
- Miguel Santana (1 paper)
- Vinicius V. Cogo (3 papers)
- Alan Oliveira de Sá (3 papers)