Skip to content

Commit 7f004e0

Browse files
committed
Deployed ebb4ee1 with MkDocs version: 1.5.3
1 parent 7c580b7 commit 7f004e0

File tree

5 files changed

+27
-3
lines changed

5 files changed

+27
-3
lines changed

assets/images/epss_fortinet.png

195 KB
Loading

epss/LEV/index.html

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2166,9 +2166,21 @@ <h3 id="misunderstanding-of-epss">Misunderstanding of <abbr title="Exploit Predi
21662166
<p>Once created, the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> model when <strong>running</strong></p>
21672167
<ul>
21682168
<li>does not know or care <strong>directly</strong> about previous exploitation activity i.e. it does not have an explicit variable for this.</li>
2169-
<li>does know and care <strong>indirectly</strong> about previous exploitation activity because the approach will boost and weight the variables/features it does have based on their relationship to historic exploitation activity.</li>
2169+
<li>does know and care <strong>indirectly</strong> about previous exploitation activity because the approach will boost and weight the variables/features it does have based on their relationship to historic exploitation activity.<ul>
2170+
<li>An example of this from <a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-landscape-report-2h-2023.pdf">Fortinet 2H 2023 Global Threat Landscape Report</a> where some of the features that <abbr title="Exploit Prediction Scoring System">EPSS</abbr> includes (Exploit code published in GitHub, Nuclei template added, reference added to <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> and twitter discussions, Metasploit module added, Intrigue adds scanner) went active, causing the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score to rise, in advance of the exploitation activity detected by the sensor.</li>
2171+
<li>This example is given to clarify the above point - not to imply that this is how it always plays out.</li>
2172+
</ul>
2173+
</li>
21702174
</ul>
21712175
</div>
2176+
<ul>
2177+
<li>
2178+
<p><figure markdown>
2179+
<img alt="" src="../../assets/images/epss_fortinet.png" width="800px" />
2180+
<figcaption></figcaption>
2181+
</figure></p>
2182+
</li>
2183+
</ul>
21722184
<div class="admonition warning">
21732185
<p class="admonition-title"><strong>CRITICAL INSIGHT: Past vs. Future Exploitation</strong></p>
21742186
<p><a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.41.pdf">NIST CSWP 41</a> suggests that <abbr title="Exploit Prediction Scoring System">EPSS</abbr> provides inaccurate scores for previously exploited vulnerabilities, and recommends changing the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores to be 1.0 for all vulnerabilities on a <abbr title="Known Exploited Vulnerability">KEV</abbr> list.</p>

print_page/index.html

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4769,9 +4769,21 @@ <h3 id="epss-lev-misunderstanding-of-epss">Misunderstanding of <abbr title="Expl
47694769
<p>Once created, the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> model when <strong>running</strong></p>
47704770
<ul>
47714771
<li>does not know or care <strong>directly</strong> about previous exploitation activity i.e. it does not have an explicit variable for this.</li>
4772-
<li>does know and care <strong>indirectly</strong> about previous exploitation activity because the approach will boost and weight the variables/features it does have based on their relationship to historic exploitation activity.</li>
4772+
<li>does know and care <strong>indirectly</strong> about previous exploitation activity because the approach will boost and weight the variables/features it does have based on their relationship to historic exploitation activity.<ul>
4773+
<li>An example of this from <a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-landscape-report-2h-2023.pdf">Fortinet 2H 2023 Global Threat Landscape Report</a> where some of the features that <abbr title="Exploit Prediction Scoring System">EPSS</abbr> includes (Exploit code published in GitHub, Nuclei template added, reference added to <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> and twitter discussions, Metasploit module added, Intrigue adds scanner) went active, causing the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score to rise, in advance of the exploitation activity detected by the sensor.</li>
4774+
<li>This example is given to clarify the above point - not to imply that this is how it always plays out.</li>
4775+
</ul>
4776+
</li>
47734777
</ul>
47744778
</div>
4779+
<ul>
4780+
<li>
4781+
<p><figure markdown>
4782+
<img alt="" src="../assets/images/epss_fortinet.png" width="800px" />
4783+
<figcaption></figcaption>
4784+
</figure></p>
4785+
</li>
4786+
</ul>
47754787
<div class="admonition warning">
47764788
<p class="admonition-title"><strong>CRITICAL INSIGHT: Past vs. Future Exploitation</strong></p>
47774789
<p><a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.41.pdf">NIST CSWP 41</a> suggests that <abbr title="Exploit Prediction Scoring System">EPSS</abbr> provides inaccurate scores for previously exploited vulnerabilities, and recommends changing the <abbr title="Exploit Prediction Scoring System">EPSS</abbr> scores to be 1.0 for all vulnerabilities on a <abbr title="Known Exploited Vulnerability">KEV</abbr> list.</p>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)