RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Product & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityMarch 18, 2025

EPSS is not foolproof: Shift your AppSec beyond vulnerabilities

The Exploit Prediction Scoring System is useful, but limited. Here's why your application security strategy needs an upgrade.

man in suit
Jaikumar Vijayan, Freelance technology journalistJaikumar Vijayan
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
shift and ctrl buttons on keyboard

A new study adds force to the argument that organizations need to look beyond vulnerability remediation when it comes to managing and mitigating software cyber-risk.

The study, by a Purdue University researcher, shows that the new Exploit Prediction Scoring System (EPSS), which many organizations are now using to prioritize vulnerability remediation, is not as effective as previously assumed.

The study demonstrates that, like other vulnerability risk assessment frameworks such as the Common Vulnerability Scoring System (CVSS) severity scores and the U.S. Cybersecurity Infrastructure and Security Agency's catalog of Known Exploited Vulnerabilities (KEVs), the EPSS is useful, but it is not a completely predictive mechanism for protecting against vulnerability-related threats.

Here's what you need to know about the limitations of the EPSS — and why your application security (AppSec) strategy needs to extend to more modern approaches.

Download: 2025 Software Supply Chain Security ReportSee the SSCS Report Webinar

Predictive models don't tell the entire story

The EPSS, which is maintained by the Forum of Incident Response and Security Teams (FIRST), is a vulnerability scoring system that uses machine learning (ML) to predict the likelihood that a software vulnerability will be exploited in the wild. The goal of the EPSS is to help security teams prioritize patching efforts based on actual exploitation risk rather than just severity scores. Many organizations see the EPSS as significantly lowering software risk.

Ken Dunham, cyberthreat director at Qualys' threat research unit, said that predictive models such as the EPSS are helpful indicators but never tell the entire story — and therefore should not be relied upon for the full context of how to identify cyber-risk. Risk is best identified using a variety of indicators and measurements, he said. That means that, in addition to using CVEs, CVSS scores, the EPSS, and KEVs, organizations making risk-mitigation decisions need to consider things such as attack surface, the criticality of assets, and environmental factors.

The bottom line is that all organizations should have a risk-based process in place, personalized to their assets and architecture, to best identify and prioritize risk as the threat-scape changes and emerges. It's less about how to improve a predictive model and more about the process of how you manage risk using these predictive models as tools, and as only part of the equation.

Ken Dunham

A trailing indicator of risk

In the Purdue study, the researcher, Rianna Parla, focused on high-severity bugs in CISA's KEVs, comparing each against its EPSS score history to see whether an EPSS score was a good indicator of whether a vulnerability would be exploited within the next 30 days. The analysis showed that in some cases the EPSS predicted a CVE's probability of exploitation before the vulnerability landed in the CISA KEV catalog, but in many other cases, it did not.

Parla's conclusion: The EPSS is more of a trailing indicator than a predictive system:

The Exploit Prediction Scoring System name may be a bit misleading as it is less of a prediction system and more of a risk scoring system. In other words, what is the risk of exploitation of a given vulnerability versus other vulnerabilities. Most of the analyzed data showed that EPSS was less effective as a measurement than simply using the CISA KEV catalog directly.

Parla's results should be of note to the many organizations that, knowing that it is impossible to remediate every single vulnerability in their environment, use the EPSS to prioritize the risks they need to address first. Unlike CVSS scores, which measure the potential severity of a vulnerability's impact, the EPSS is supposed to predict the likelihood of attackers actively exploiting the vulnerability, based on a combination of real-world exploit data, threat intelligence, and ML.

Context is key

Jeff Williams, co-founder and CTO of Contrast Security, said the key to unlocking any benefits from such mechanisms is context. That context, he said, consists of technical details on what systems are being targeted, what attack vectors are being used, and which kinds of vulnerability are being discovered by attackers, as well as business factors such as which systems are attractive to attackers, what kinds of data is present, and what access an exploit could provide.

If you only look at a score that hasn’t been enriched with context, then you’re never going to get good predictions.

Jeff Williams

Parla wrote that the results of the study highlight the need for a defense-in-depth approach to cyber-risk mitigation. Though occasionally the EPSS does correctly identify high-risk vulnerabilities prior to their inclusion in the CISA KEVs, organizations cannot solely rely on it as a risk-mitigation approach, she said.

Though the study shows that the EPSS is less effective than assumed, no one is suggesting that organizations stop using it or any of the other vulnerability risk-assessment mechanisms. Security experts perceive each framework — CVSS scores, the EPSS, and KEVs — as providing at least some help in guiding organizations to vulnerabilities that present the highest risk and therefore take priority. But the key is to keep expectations in check and understand that a focus on vulnerability patching alone is risky.

John Bambenek, president of Bambenek Consulting, said that while organizations need all three risk-assessment frameworks to inform software risk-mitigation decisions, the best intelligence will always be whatever attacks and malicious activity the organization sees on its own networks and what attackers have targeted. The CVSS framework was not designed to tell you what an attacker will do, Bambenek noted, and KEVs only have data on attacks and vulnerabilities that are relevant to CISA's core audience of federal government agencies. He called the EPSS a good attempt to get to something that is more predictive, but he added that trying to predict the future is always difficult.

Using AI/ML for cybersecurity is an inherently risky thing because attackers already have decades of experience in fooling automated systems and their entire mode of operations is doing unpredictable things. Using retrospective models for future prediction breaks down when you are trying to model behavior of those who don’t have to worry about technical debt or reverse compatibility.

John Bambenek

Inherent limitations with ML

Casey Ellis, founder at the crowdsourced cybersecurity firm Bugcrowd, said ML-driven predictions have inherent limitations that make them effective at ranking known threats but not so much at predicting unknown exploits. "To refine these models, integrate broader datasets, consider advanced analytics such as large language models for deeper context, and regularly validate outcomes against real-world incidents," Ellis said.

SOCs and incident response teams should prioritize the KEVs and flaws listed on CISA's catalog as active threats, Ellis said. They should also prioritize vulnerabilities based on CVSS scores and use EPSS scores to identify vulnerabilities with high likelihood of exploitation, even if not yet listed by CISA, he said.

Beyond that, look at asset criticality and maintain your own threat model, Ellis said.

Prioritize based on the importance and exposure of affected assets. Regularly reassess and adjust your prioritization strategy as new threats and data emerge.

Casey Ellis

Why your AppSec must shift beyond vulnerability mitigation

Recent research from VulnCheck showed that threat actors exploited 768 unique vulnerabilities in the wild in 2024, marking a 20% increase over the previous year. That sharp rise in exploit activity involving old, new, and zero-day bugs has made it clear that vulnerability patching cannot be the sole mechanism for protecting against attacks and data breaches.

Nearly a quarter of those CVEs were exploited on or before their public disclosure, meaning organizations had little or no opportunity to patch the vulnerabilities before attackers began exploiting them. Making matters worse, last year saw a 40% increase in total vulnerability disclosures, reaching 39,000, up from 28,000 in 2023, a new report from GuidePoint Security disclosed. That's an average of 378 vulnerability disclosures every day.

These reports — and the rise of artificial intelligence-derived coding and software supply chain attacks — demonstrate that the time has come for organizations to look beyond vulnerability mitigation when it comes to shoring up their AppSec — and take steps to develop a modern approach.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI agents risk

Claude Mythos: Get your AppSec game on

Anthropic's new AI is a 'step change' for exposing software flaws — but also ramps up exploits. Are you ready for it?

Learn More about Claude Mythos: Get your AppSec game on
Claude Mythos: Get your AppSec game on
28

28 application security stats that matter

AI and open source are redefining the software threat landscape. Here are the key statistics you need to know.

Learn More about 28 application security stats that matter
28 application security stats that matter
axios

Axios: How AppSec teams should respond

Here's a mitigations checklist and best practices. Plus: How RL’s xBOM and Spectra Assure Community can help.

Learn More about Axios: How AppSec teams should respond
Axios: How AppSec teams should respond
Software trust debt

How JPMC tackles software ‘trust debt’

JPMorgan Chase CISO Patrick Opet discussed his letter on third-party software risk — and how that has played out.

Learn More about How JPMC tackles software ‘trust debt’
How JPMC tackles software ‘trust debt’

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top