From the course: Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Combining severity and risk to drive action

Combining severity and risk to drive action

- [Instructor] Now that we know how severity, exploit availability, and asset categorization work, let's talk about how to combine these concepts to prioritize remediation actions. We're going to step into the role of a security analyst at Red 30 and take a look at a vulnerability found on two servers in the Red 30 environment. The first vulnerability is CVE 2024 29059, and it's been found on two systems in our environment, web and Intranet Web. Let's explore the severity details. First we check the NVD and see the CVSS 3.1 score for this is 7.5 or high, based on the CVSS vector string this vulnerability is easy to exploit over a network connection without any special access or user interaction. A successful attack would result in complete loss of confidentiality for any data in the dotnet framework. That high severity sounds accurate. Next, let's look at the CISA KEV to see if the vulnerability has any known exploits. We'll go to the KEV page on csa.gov and search for our CVE. Turns…

Contents