How Vulnerable Are We?

By Megan Daudelin Vulnerability Management Reports

CISOs often ask “How vulnerable are we?” when presented with vulnerability metrics and reports. As the head of a security team, are you prepared to answer that question? The answer to that question often lies in the relationship between vulnerability and exploitability. All exploitable vulnerabilities are, of course, vulnerabilities. But when a vulnerability isn’t marked “exploitable,” what does that mean? The most accurate answer would be that an exploitation hasn’t been discovered yet, but the vulnerability still has the potential to be exploited.

CISOs often ask “How vulnerable are we?”™ helps you better understand the vulnerability of your network and your risk exposure with the data presented in the Critical and Exploitable Vulnerabilities report. helps you better understand the vulnerability of your network and your risk exposure

First, let’s clear up some terminology.


In computer security, a “vulnerability” is a weakness in the steps that are taken to secure a system that may allow unauthorized access to privileged data. In the simplest form, a misconfiguration of file level permissions can grant unauthorized users access to a file, folder, application, or service. In a more complex example, unpatched versions of SMB on Windows hosts allow attackers to bypass authentication and execute code remotely as demonstrated by the WannaCry ransomware. Regardless of how simple or complex the vulnerability, the question quickly becomes: can the vulnerability be exploited? leverages your scan data to provide accurate insight into all the vulnerabilities detected in your organization.


The term “exploit” is commonly used to describe software that has been developed to attack an asset by taking advantage of a vulnerability. The objective of many exploits is to gain control of an asset. For example, a successful exploit of a database vulnerability can provide an attacker with the means to collect or exfiltrate all the records from that database, resulting in a data breach. Exploits are also developed to attack a vulnerability in order to gain remote administrative privileges on a host. With, you can identify which hosts in your network have exploitable vulnerabilities, and prioritize remediation efforts accordingly.

Exploit frameworks

Security researchers know that to truly test and understand the nature of exploiting a vulnerability, an exploit framework is needed. An exploit framework is an abstraction in which the foundation of the software provides the generic functionality, and users can write code modules to perform specific tasks. For example, the developers of Metasploit, Core Impact and several others created exploit frameworks to leverage common attack techniques and delivery methods, while the users create the actual exploits. These exploit frameworks can be used by inexperienced attackers to create an attack that may look sophisticated because most of the difficult work has been created by the framework. For example, once you understand how to leverage the exploit framework to exploit a buffer overflow, replicating the attack seems trivial. The industry is seeing a rise in malware code that appears to have been developed using the various exploit frameworks as they become more popular. enables you to search for the presence of vulnerabilities in your network related to specific exploit frameworks.

The solution can easily identify systems that are more vulnerable and exploitable than other systems. The Critical and Exploitable Vulnerabilities report provides detailed information on these hosts. Critical and Exploitable Vulnerabilities report

The chapters in the Critical and Exploitable Vulnerabilities report give you a comprehensive list of the hosts on your network with critical or exploitable vulnerabilities identified during vulnerability scanning. Also included are the top ports being leveraged and lists of the most critical or exploitable vulnerabilities. All of this detailed information can be used to prioritize hosts and vulnerabilities for remediation.

The Critical Vulnerabilities tables in two of the chapters list the most pervasive exploitable and critical vulnerabilities. The vulnerabilities in these lists should be targeted for efficient remediation to effectively reduce the overall vulnerability and risk exposure of the network.

Critical Vulnerabilities table list

Regardless of your approach to mitigating risks identified by – by applying patches, configuring mitigation controls, or hardening operating systems – the first step is to clearly qualify the risks into actionable tasks and deliverables. provides information security professionals with the tools and resources needed to perform a detailed qualitative analysis of the risk that threatens business assets. The Critical and Exploitable Vulnerabilities report provides insight into your current risk exposure. Armed with, you’ll be prepared to provide an accurate answer the next time the CISO asks you how vulnerable your organization is.

Armed with, you’ll be prepared to provide an accurate answer the next time the CISO asks you how vulnerable your organization is

Try provides accurate information on how well your organization is addressing security risks, and helps track improvements over time. Get a free trial of Vulnerability Management for 60 days.

Source:: Tenable Blog