Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-282: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

    April 20, 2026

    Preparing for severe cyber threat: why leaders must act now

    April 20, 2026

    [Control systems] CISA ICS security advisories (AV26–339)

    April 20, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Helping Enterprises & Governments Adopt Stakeholder Specific Vulnerability Categorization (SSVC) | Blog
    News

    Helping Enterprises & Governments Adopt Stakeholder Specific Vulnerability Categorization (SSVC) | Blog

    adminBy adminApril 19, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Stake-holder Specific Vulnerability Categorization (SSVC) is a methodology for prioritizing vulnerabilities that has created at Carnagie Melon’s Software Engineering Institute largely been popularized by the Cybersecurity & Infrastructure Security Agency encouraging federal agencies and enterprises to modernize their approach to vulnerability management. In 2024, CISA released Vulnrichment which is an effort to provide the enrichment of SSVC decisions on CVE records which has set a foundational example on how to implement SSVC.

    After hearing from federal agencies and enterprise organizations adopting SSVC across their vulnerability management program, we decided to set out to automate the creation of SSVC decisions across all CVEs to help make SSVC adoption a more realistic possibility.

    Example CISA SSVC Decision Tree
    CISA SSVC
    Source: CISA SSVC

    We’ve focused on automating the creation of SSVC decisions that can be generated through existing vulnerability and exploitation intelligence which include the Exploitation, Automatable and Total Impact decisions. We follow the same structure for the SSVC decisions as outlined in CISA’s SSVC Guide.

    Exploitation Decision

    Value Definition
    None There is no evidence of active exploitation and no public proof of concept (PoC) of how to exploit the vulnerability.
    Public PoC A known POC exploit exists which is sourced from VulnCheck’s Exploit Intelligence. This includes Proof-of-Concept, Commercial and Weaponized exploits.
    Active Reliable evidence that cyber threat actors have used the exploit in the wild sourced from VulnCheck KEV which references credible sources.

    Technical Impact Decision

    Value Definition
    Partial CVSS metrics are used to identify when a decision node is Technical Impact:Partial. When CVSS metrics are not equal to ConfidentialityImpact: “HIGH”, IntegrityImpact: “HIGH” the vulnerabilities is marked with Total.
    Total CVSS metrics are used to identify when a decision node is Technical Impact:Total. When CVSS metrics are equal to ConfidentialityImpact: “HIGH”, IntegrityImpact: “HIGH” the vulnerabilities is marked with Total.

    Automatable Decision

    Value Definition
    Yes CVSS metrics are used to identify when a decision node is automatable. The CVE is marked as automatable when the vulnerability is not a memory corruption vulnerability and the CVSS metrics are equal to AttackVector: “NETWORK”, PrivilegesRequired: “NONE”, UserInteraction: “NONE”, AttackComplexity: “LOW”.
    No Vulnerabilities without the conditions listed for automatable = Yes are marked as non-automatable.

    We’ve included CISA Vulnrichment alongside VulnCheck SSVC so you can compare between VulnCheck and CISA. Notable differences include a significant increase in CVE coverage, more exploitation evidence and more timely SSVC node generation.

    SSVC Example

    VulnCheck-NVD2 API Response Example

    "ssvc": [
      {
        "source": "CISA-ADP",
        "exploitation": "POC",
        "automatable": "NO",
        "technicalImpact": "TOTAL"
      },
      {
        "source": "VulnCheck",
        "exploitation": "ACTIVE",
        "automatable": "NO",
        "technicalImpact": "TOTAL"
      }
    ],
    

    VulnCheck currently has SSVC coverage for 244,866 CVE’s while CISA Vulnrichment has SSVC coverage for only 64,142 CVE’s.

    We’ve calculated a CISA / VulnCheck match rate for each decision node that is calculated using the % match for VulnCheck of CISA Vulnrichment. It’s worth mentioning that when we did a manual audit of mismatched decisions we often found inconsistencies in the decision generated by CISA that we believe would increase our match rates if these decisions were correct. This is common for manually generated vulnerability data that often lacks data validation.

    CISA SSVC Decision VulnCheck SSVC Decision Match Rate
    exploitation:active 100%
    exploitation:poc 86.7%
    exploitation:none 90.6%
    automatable:yes 88.9%
    automatable:no 92.3%
    technicalimpact:total 95.2%
    technicalimpact:partial 85.6%

    VulnCheck is helping organizations not just to solve the vulnerability prioritization challenge – we’re working to help equip any product manager, security team and threat hunting team to get faster and more accurate intelligence with infinite efficiency using VulnCheck solutions.

    We knew that we needed better data, faster across the board, in our industry. So that’s what we deliver to the market. We’re going to continue to deliver key insights on vulnerability management, exploitation and major trends we can extrapolate from our dataset to continuously support practitioners.

    Are you interested in learning more? If so, VulnCheck’s Exploit & Vulnerability Intelligence has the broadest coverage.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRed Hat security advisory (AV26-341)
    Next Article CVE-2026-6591 | THREATINT
    admin
    • Website

    Related Posts

    News

    Preparing for severe cyber threat: why leaders must act now

    April 20, 2026
    News

    Zyxel Telnet Vulnerabilities | Blog

    April 19, 2026
    News

    Zyxel HTTP Vulnerability | Blog | VulnCheck

    April 19, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Our Picks

    ZDI-26-282: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

    April 20, 2026

    Preparing for severe cyber threat: why leaders must act now

    April 20, 2026

    [Control systems] CISA ICS security advisories (AV26–339)

    April 20, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.