Identify and prioritize exploitable vulnerabilities
Last updated
Was this helpful?
Last updated
Was this helpful?
In the context of vulnerability assessment, Helm provides a practical framework for understanding and prioritizing vulnerabilities based on severity, exploitability, and potential threats. This article outlines how Helm utilizes CVSS v2 and v3 scores, along with EPSS scores and threat sources, including indicating if vulnerabilities are on the CISA KEV list, whether they are in the Exploit Database (exploit-db.com) or have a Metasploit toolkit available to make attacks easier, and whether they meet the criteria of the top 25 CWEs (Common Weakness Enumerations).
You can across an entire product version based on your device's environment and usage, or . Customize vulnerability scores based on your device's unique environment and usage, recalibrating severity, exploitability, and threat information for a tailored assessment that minimizes false positives while pinpointing your more exploitable and critical vulnerabilities, thereby strengthening your cybersecurity defenses.
You can easily stay on top of new and updated vulnerabilities:
of new vulnerabilities impacting your software supply chain.
Identify those with .
with suggested Windows KB updates
Stay updated with information from the National Vulnerability Database (NVD).
To ensure you're focusing on the most exploitable vulnerabilities:
across a product version
Once you've rescored your vulnerabilities, down on those that have a combination of high CVSS scores with high exploitability (EPSS) scores and that have exploits or threats.
You can filter on the following exploit and threat information for vulnerabilities that:
are on the CISA KEV list
are in the Exploit Database
have a Metasploit toolkit available
meet the criteria of the top 25 CWE list
have a particular EPSS threshold: Enter a number, such as 80, into the EPSS filter. This will return any vulnerabilities with an EPSS score of 80% or above.
vulnerabilities within a product, across products, or target a particular component's vulnerabilities with the click of a button, enabling you to speed triage and ensure remediation consistency of particular vulnerabilities across your product portfolio.
If you’ve previously assessed a vulnerability, you can turn on the Date updated to see whether there have been any updates.
If you've turned on vulnerability , Helm will automatically send you emails whenever there is a new vulnerability.