/

March 19, 2025

Is CVSS really dead?

Is CVSS Really Dead? Exploring Alternatives for Risk Prioritization

The Common Vulnerability Scoring System (CVSS) has long been a go-to framework for assessing the severity of vulnerabilities. However, it’s not without its flaws. Many security professionals argue that CVSS outputs often fail to accurately prioritize patching efforts because they do not account for the specific context of an organization’s infrastructure, threat landscape, or business needs.

This raises the question: If not CVSS, then what? In this article, we’ll explore why CVSS is criticized, examine alternative methods like the Stakeholder-Specific Vulnerability Scoring (SSVS) and Exploit Prediction Scoring System (EPSS), and outline actionable strategies for effective vulnerability prioritization.

The Limitations of CVSS

While CVSS provides a standardized way to measure vulnerability severity, it often falls short in real-world scenarios. Here are some of the key criticisms:

  1. Lack of Context: CVSS scores are static and do not account for an organization’s unique environment. For example, a vulnerability with a high CVSS score may not be a critical risk if it’s isolated in a non-essential system.

  2. Overemphasis on Severity: CVSS focuses heavily on the technical severity of vulnerabilities without considering their exploitability or potential impact on business operations.

  3. Patch Fatigue: Relying solely on CVSS scores can lead to patching everything labeled as “high” or “critical,” causing teams to spend resources on vulnerabilities that pose little actual risk.

  4. Time Insensitivity: CVSS scores are static and don’t adapt to the evolving threat landscape, such as the emergence of new exploits or changes in attack vectors.

Alternatives to CVSS

Several alternative frameworks and methodologies have been proposed to address these shortcomings. Two of the most notable are Stakeholder-Specific Vulnerability Scoring (SSVS) and the Exploit Prediction Scoring System (EPSS).

1. Stakeholder-Specific Vulnerability Scoring (SSVS)

What It Is: SSVS tailors vulnerability scores to an organization’s specific environment and priorities. This approach involves considering factors like asset value, business impact, and the likelihood of exploitation within the organization’s unique context.

How It Works:

  • Asset Criticality: Map vulnerabilities to the assets they affect and prioritize based on the asset’s importance to business operations.

  • Business Impact: Evaluate the potential consequences of a successful exploit, such as financial loss, reputational damage, or compliance penalties.

  • Threat Context: Assess whether the vulnerability is likely to be targeted based on threat intelligence and the organization’s attack surface.

Advantages:

  • Provides a customized risk assessment tailored to organizational needs.

  • Helps focus efforts on vulnerabilities that truly matter.

2. Exploit Prediction Scoring System (EPSS)

What It Is: EPSS predicts the likelihood that a vulnerability will be exploited in the wild. Developed by FIRST.org, it leverages real-world exploit data and machine learning to produce dynamic, context-aware scores.

How It Works:

  • Combines historical exploit data with machine learning models to predict the probability of exploitation.

  • Dynamically updates scores based on new threat intelligence.

Advantages:

  • Focuses on actual exploitability rather than theoretical severity.

  • Reduces the noise from vulnerabilities that are unlikely to be exploited.

How to Prioritize Vulnerabilities Effectively

If CVSS alone is insufficient, and alternatives like SSVS and EPSS offer more context-aware approaches, how should organizations go about prioritizing vulnerabilities? Here’s a step-by-step guide:

Step 1: Inventory and Asset Classification

  • Create an up-to-date inventory of all assets, including their criticality and role within your organization.

  • Assign a value to each asset based on its importance to business operations.

Step 2: Incorporate Threat Intelligence

  • Leverage threat intelligence feeds to understand active threats and exploit trends.

  • Correlate this data with your vulnerability management program to identify high-risk vulnerabilities.

Step 3: Combine Scoring Frameworks

  • Use CVSS as a baseline but enhance it with SSVS and EPSS.

  • For example, prioritize vulnerabilities with high EPSS scores that also affect critical assets.

Step 4: Evaluate Business Impact

  • Assess the potential consequences of exploitation, such as downtime, financial losses, or regulatory fines.

  • Use this information to adjust prioritization.

Step 5: Automate and Orchestrate

  • Implement vulnerability management tools that integrate with SSVS and EPSS.

  • Automate workflows to ensure timely patching of critical vulnerabilities.

Step 6: Regularly Reassess Priorities

  • Conduct periodic reviews to adapt to changes in the threat landscape and your organization’s infrastructure.

  • Use feedback loops to refine your prioritization strategy.

Case Study: A Practical Example

Scenario: A financial services company discovers a vulnerability with a CVSS score of 9.0 in a legacy system that handles non-critical operations.

  1. SSVS Application:

    • Asset Value: The legacy system is deemed low-priority.

    • Business Impact: Exploitation would not disrupt critical operations.

    • Priority: Medium – defer patching in favor of more critical issues.

  2. EPSS Analysis:

    • EPSS Score: 5% likelihood of exploitation.

    • Priority: Low – monitor but do not prioritize patching.

  3. Outcome:

    • Resources are redirected to addressing a vulnerability with a CVSS score of 7.5 but an EPSS score of 60% affecting a customer-facing application.

Conclusion

CVSS is not dead, but it’s no longer sufficient as a standalone tool for vulnerability prioritization. By integrating context-aware frameworks like SSVS and EPSS, organizations can make more informed decisions and focus on vulnerabilities that pose the greatest actual risk.

The key to effective prioritization lies in understanding your unique environment, leveraging dynamic threat intelligence, and adopting a holistic approach that combines multiple scoring systems. By doing so, you can optimize your vulnerability management program and stay ahead in an ever-evolving threat landscape.

Ready to take the next step toward enhancing your cybersecurity strategy? Fill out our Virtual CISO Discovery Form today and unlock tailored insights to strengthen your defenses and focus on what truly matters.