TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Prioritizing Vulnerability Management Using Machine Learning

2020-02-14 · Read original ↗

ATT&CK techniques detected

4 predictions
T1190Exploit Public-Facing Application
90%
“exploit descriptions provide more information for the other key factors. first, because there are exploits, we know factor “ proof - of - concept exploit available ” is yes, adding a weight of 1. 50. the first impact of the exploit shows that code execution is part of the payload…”
T1190Exploit Public-Facing Application
66%
“2019. html ). that update mentioned specific cves being targeted for attack ( hint : this a great resource to use for patching priority, as well ). one of the cves f5 labs noted being exploited in the wild was cve - 2019 - 11043. specifically, we saw two campaigns targeting think…”
T1588.006Vulnerabilities
39%
“##ze patching using the common vulnerability scoring system ( cvss ) rating of 1 ( lowest ) to 10 ( most severe ). but in 2013, mike roytman of kenna security and dan geer of in - q - tel published an article showing how cvss is a flawed system for prioritizing patching. specific…”
T1587.004Exploits
36%
“that ’ s the first weight of 0. 06. further down the page, there is a list of vendor references, some of which are shown in figure 2. figure 2. references for cve - 2019 - 11043 at national vulnerability database site. we can simply count the number of references and see there ar…”

Summary

Using a few free web sources and a spreadsheet, security teams can use machine learning to quickly predict which critical vulnerabilities will be exploited.