The Vulnerability Catalog uses professional risk assessment systems employed in the commercial Scanner-VS 7 by JSC “ Echelon Technologies”. Understanding these systems is critical for effective threat analysis and making informed protection decisions.
CVSS — Common Vulnerability Scoring System
CVSS is an international standard for quantitative assessment of information security vulnerability severity, adopted in both Russian and foreign threat analysis systems.
CVSS Assessment Principles
Basic Concept: CVSS evaluates the maximum possible impact of a vulnerability under the most unfavorable exploitation scenario, providing a numerical score from 0.0 to 10.0.
Mathematical Model: The final score is calculated based on eight core metrics covering:
- Attack Complexity
- Privileges Required
- User Interaction
- Impact on confidentiality, integrity, and availability
Classification by Criticality Levels
Criticality | Range | Description | Response Timeframes |
---|---|---|---|
🔴 Critical | 9.0 - 10.0 | Vulnerabilities with catastrophic system impact | 24 hours |
🟠 High | 7.0 - 8.9 | Serious vulnerabilities requiring immediate attention | 7 days |
🟡 Medium | 4.0 - 6.9 | Significant vulnerabilities for scheduled remediation | 30 days |
🟢 Low | 0.1 - 3.9 | Vulnerabilities with limited impact | 90 days |
⚪ None | 0.0 | Informational messages without security impact | As needed |
CVSS Standard Evolution
CVSS v2.0 (Legacy)
Historical Context:
- First widely adopted standardization system
- Basic impact and exploitability metrics
- Used for compatibility with legacy systems
Main Components:
- Access Vector (local/remote access)
- Access Complexity (exploitation simplicity)
- Authentication (authentication requirements)
- Impact metrics (CIA - Confidentiality, Integrity, Availability)
CVSS v3.1 (Current Standard)
Improvements over v2.0:
- More precise attack complexity gradation
- Modern attack vector consideration
- Separation of privileges and user interaction
- Improved final score calculation algorithms
Key v3.1 Metrics:
- Attack Vector — network/adjacent/local/physical
- Attack Complexity — low/high complexity
- Privileges Required — none/low/high
- User Interaction — not required/required
- Scope — unchanged/changed
- Impact — CIA impact (0-High)
CVSS v4.0 (Latest Version)
Revolutionary Changes:
- Expanded attack vector detail
- New metrics for IoT and cloud environments
- Improved accuracy for modern threats
- Supply Chain attack support
v4.0 Innovations:
- Attack Requirements — attack condition requirements
- Vulnerable System Impact — impact on vulnerable system
- Subsequent System Impact — impact on connected systems
- Safety Impact — physical security influence
Practical CVSS Application
CVSS Vector Interpretation
Critical Vulnerability Example:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Score: 10.0 (Critical)
Breakdown:
- AV:N — network attack (Network)
- AC:L — low complexity (Low)
- PR:N — no privileges required (None)
- UI:N — no user interaction needed (None)
- S:C — scope change (Changed)
- C:H/I:H/A:H — high impact on all CIA aspects
Medium-Level Vulnerability Example:
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N
Score: 3.8 (Low)
Breakdown:
- AV:L — local attack (Local)
- AC:H — high complexity (High)
- PR:H — high privileges (High)
- UI:R — interaction required (Required)
- S:U — unchanged scope (Unchanged)
- C:L/I:L/A:N — limited impact
EPSS — Exploit Prediction Scoring System
EPSS represents an innovative approach to threat assessment, using machine learning and threat intelligence to predict the real probability of vulnerability exploitation.
Concept and Methodology
Basic Principle: Unlike CVSS, which assesses potential impact, EPSS predicts the probability that a specific vulnerability will be exploited in real conditions within the next 30 days.
Model Data Sources:
- Public exploit databases (Exploit-DB, Metasploit)
- Threat intelligence feeds from leading vendors
- Dark web activity analysis
- Real cybersecurity incident statistics
- Social media and hacker forums
EPSS Assessment Scale
Probabilistic Model (0.0 - 1.0):
Risk Level | EPSS Range | Interpretation | Practical Recommendations |
---|---|---|---|
🔴 Critical | 0.8 - 1.0 | 80-100% exploitation probability | Immediate protective measures |
🟠 High | 0.6 - 0.8 | 60-80% attack probability | Priority remediation |
🟡 Medium | 0.4 - 0.6 | 40-60% usage probability | Planned measures within a month |
🟢 Low | 0.2 - 0.4 | 20-40% attack probability | Monitoring and assessment |
⚪ Minimal | 0.0 - 0.2 | 0-20% exploitation probability | Background observation |
Dynamic Nature of EPSS
Daily Updates: EPSS scores are updated every 24 hours based on:
- Newly discovered exploits
- Threat landscape changes
- Community vulnerability relevance
- Automated exploitation tool emergence
Factors Influencing EPSS Changes:
- PoC Exploit Publication — sharp score increase
- Exploit Kit Integration — significant probability growth
- Mass Campaigns — temporary relevance increase
- Patch Release — gradual score decrease
CVSS and EPSS Synergy in Professional Analysis
Decision Matrix
Critical Priority (Immediate Response):
- CVSS ≥ 9.0 + EPSS ≥ 0.8
- High impact + High exploitation probability
- Examples: RCE in popular web servers, critical OS vulnerabilities
High Priority (Within a week):
- CVSS 7.0-8.9 + EPSS ≥ 0.6 OR CVSS ≥ 9.0 + EPSS 0.2-0.6
- Serious impact with moderate probability OR critical impact with low probability
- Examples: Privilege escalation with available exploits
Medium Priority (Within a month):
- CVSS 4.0-6.9 + EPSS 0.3-0.6
- Moderate impact with moderate probability
- Examples: Information disclosure in specialized software
Low Priority (Planned measures):
- CVSS ≤ 4.0 OR EPSS ≤ 0.3
- Low impact OR low exploitation probability
- Examples: DoS vulnerabilities with local access
Comprehensive Analysis Cases
Case 1: Critical Web Vulnerability
Characteristics:
- CVE-2024-XXXX: Remote Code Execution in Apache HTTP Server
- CVSS 3.1: 9.8 (Critical)
- EPSS: 0.95 (Critical)
- Available exploits: Metasploit, public PoCs
Analysis:
- Maximum criticality by both metrics
- Wide Apache HTTP Server distribution
- Active wild exploitation
- Decision: Immediate emergency patching (within 24 hours)
Case 2: Local Privilege Escalation
Characteristics:
- CVE-2024-YYYY: Local Privilege Escalation in Windows
- CVSS 3.1: 8.8 (High)
- EPSS: 0.15 (Very Low)
- Exploits: Proof-of-concept only
Analysis:
- High impact but low exploitation probability
- Requires local system access
- Complex exploitation conditions
- Decision: Scheduled update within a month
Case 3: IoT Vulnerability
Characteristics:
- CVE-2024-ZZZZ: Authentication Bypass in Smart Cameras
- CVSS 3.1: 6.5 (Medium)
- EPSS: 0.85 (Critical)
- Exploits: Mass botnet attacks
Analysis:
- Moderate technical impact
- Very high mass exploitation probability
- Attack automation simplicity
- Decision: Priority protection measures (device isolation)
Russian Threat Assessment Specifics
Integration with FSTEC Russia BDU
Russian Classification Features:
- Domestic IT infrastructure specifics consideration
- Compliance with regulator requirements (FSTEC, FSB)
- Critical information infrastructure protection priority
- Special attention to certified software vulnerabilities
International Standards Adaptation:
- CVSS compliance with international practices
- Additional analysis for domestic solutions
- Geopolitical factor consideration in threat intelligence
- Specialized threat data sources
Application in Scanner-VS 7
Intelligent Prioritization: The commercial Scanner-VS 7 uses an advanced model combining:
- CVSS scores of all versions (2.0, 3.1, 4.0)
- EPSS forecasts considering Russian threat landscape
- Applicability analysis to specific IT environment
- Automatic correlation with existing protective measures
Contextual Scoring:
- Organization network architecture consideration
- Protected asset criticality analysis
- SIEM integration for current threat assessment
- Personalized remediation recommendations
Practical Recommendations
For Information Security Specialists
Daily Work:
- Critical change monitoring — tracking vulnerabilities with CVSS ≥ 9.0
- EPSS dynamics analysis — identifying growing threats
- Asset correlation — assessing applicability to your environment
- Measure planning — developing vulnerability remediation roadmap
Strategic Planning:
- Building vulnerability management programs
- Integration with risk management processes
- Routine assessment process automation
- Team training in professional methodologies
For Information Security Managers
Reporting Metrics:
- Number of critical vulnerabilities (CVSS ≥ 9.0)
- Average remediation time by criticality categories
- Risk exposure change dynamics
- ROI from vulnerability management system investments
Investment Justification:
- Real risk demonstration through EPSS scores
- Potential incident damage calculation
- Preventive measures vs. response cost comparison
- Regulator requirement compliance
Transition to Automated Assessment
Manual Analysis Limitations
Scaling Problems:
- Thousands of new vulnerabilities monthly
- EPSS change tracking complexity
- Need for expert applicability assessment
- Human factor in decision making
Scanner-VS 7 Capabilities
Automated Scoring:
- Continuous database change monitoring
- Automatic risk reassessment on EPSS changes
- Intelligent relevance filtering
- Personalized alerts and recommendations
IT Process Integration:
- Automatic vulnerable software discovery in infrastructure
- Real risk-based patching prioritization
- Configuration management system integration
- Multi-level management reporting
Getting a Professional Assessment System
Commercial Solution Advantages
Scanner-VS 7 provides complete vulnerability management lifecycle:
- Automated Discovery of IT infrastructure vulnerabilities
- Intelligent Prioritization based on CVSS/EPSS and environment context
- Rapid Deployment — 1-minute installation
- Minimal Requirements — 2 GB RAM, 2 CPU cores
- FSTEC Russia Certificate №2204 (4UD, TU) for Scanner-VS 6 version, Scanner-VS 7 certificate expected in 2025
- Domestic OS Support (Astra Linux, RED OS, Alt Linux)
Implementation Contacts
JSC “Echelon Technologies”:
- 📧 Email: partners@npo-echelon.ru
- 📞 Phone: 8 (495) 223-23-92
- 🏢 Address: 107023, Moscow, Elektrozavodskaya str., 24
- 🛠️ Tech Support: 8 (800) 100-05-02
Understanding CVSS and EPSS assessment systems is the foundation for effective information security risk management. The Vulnerability Catalog provides an educational foundation for mastering these technologies, while Scanner-VS 7 is a professional tool for their application at industrial scale.