Go to content

Cybersecurity

Exposure Management 101: Vulnerability Management

Derek Melber

Derek Melber


Chief Strategist

16.02.24


4 min read


Introduction

Vulnerability management is not a new concept. It might be one of the oldest security concepts for organizations, to be honest. However, vulnerability management might be one of the most misunderstood areas of security for most organizations due to the overwhelming number of vulnerabilities that all organizations face. The volume of vulnerabilities might even prohibit the organization from securing much of anything.  

Vulnerability Prioritization and Exploitation 

At the core of most vulnerability management solutions is the concept of “prioritization”. Prioritization is essential in triaging vulnerabilities due to the fact that there are very few known vulnerabilities that have been exploited. According to NIST (from 1/1/1999-2/10/2024): 

  • Total vulnerabilities with CVSS > 9.0: 40,456 
  • Total vulnerabilities with CVSS between 7.0 and 9.0: 79,140 
  • Total known exploited vulnerabilities: 1085 

This makes the % of high and critical vulnerabilities that have been exploited less than 1%. NIST has also reduced this value of KEV to just around 20, which have been proven to be in most enterprises (1). 

What does this mean for most organizations? The majority of vulnerabilities do not need to be addressed.  

Combining Asset Priority with Vulnerability Priority 

A key concept that most organizations can benefit from is the combination of asset and vulnerability priorities. With so many vulnerabilities to overcome, it would be ideal to know when high-value assets have the highest priority vulnerability.  

A solution that can give you a list of the highest priority exploited vulnerabilities on the highest value assets can save time and have the biggest impact in reducing risk due to vulnerabilities. Look at this example: 

Here is a list of all vulnerabilities in this test environment (3884): 

Vulnerability management within the Nanitor dashboard

Now, looking at the assets that have a prioritization of at least 7, the vulnerabilities reduce (3387): 

Vulnerability management within the Nanitor dashboard

Next, focusing on the vulnerabilities that are between 7.0 and 10.0 (166): 

Vulnerability management within the Nanitor dashboard

Finally, looking at only the vulnerabilities that meet our criteria and are on the KEV (41): 

Vulnerability management within the Nanitor dashboard

Using this method, we reduced the total number of vulnerabilities from 3884 down to only 41 that are exploited and located on high-value assets! That is very manageable for any organization.  

Conclusion 

Vulnerability management and analysis is not new. However, being able to manipulate the data to ensure that only the important vulnerabilities are addressed on the most important assets can make the difference between patching vulnerabilities and having a very high-risk environment.  

To see where your assets are with vulnerabilities and to know which assets you need to address, visit us at https://www.nanitor.com or contact joe@nanitor.com for a customized demo.  

 

1 - Virtual SED All Hands (nist.gov)