Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

ConnectSecure checks against all assets to categorize end-of-life (EOL) in two ways.

  1. OS-OUT-OF-SECURITY-SUPPORT

  2. OS-OUT-OF-ACTIVE-SUPPORT

This is found in the Problem Group of ‘Informational’ as shown in the example below:

image-20240506-181350.png

Risk Score Calculations for EOL on Active/Security Support

Level

Description

1

Both Active and Security Support have ended; no support is available

3

If the operating system is within 1 year of its security support end date; limited support

4

If the operating system is within its Active support but past its Security support; extended support

5

If the operating system is within both Active and Security support timelines; full support


Severity and Risk Scoring Descriptions

Severity

This indicates the seriousness or criticality of a vulnerability. Common severity levels include low, medium, high, and critical. Higher severity vulnerabilities typically pose a greater risk and require more immediate attention and mitigation.

Base Score

A numerical value is assigned to a vulnerability based on its characteristics and potential impact. It is often calculated using a standardized formula, such as the Common Vulnerability Scoring System (CVSS), which considers factors like exploitability, impact, and other metrics.

EPSS Score

Environmental Score is a component of the CVSS (Common Vulnerability Scoring System) that considers environmental factors specific to the organization's environment. This score reflects how the vulnerability affects the specific deployment environment and helps assess the risk in real life.

Exploitability Score

Indicates the ease with which an attacker could exploit the vulnerability to launch an attack. Factors such as the availability of exploits, complexity of exploitation, and required privileges may contribute to this score.

Impact Score

The Impact Score evaluates the potential impact of a vulnerability on the affected system or organization. It considers factors such as data loss, system compromise, service disruption, regulatory compliance impact, and financial repercuss


How is ‘Severity’ calculated?

Severity information is imported from the standard vulnerability databases.  

So, the standard calculation below is followed by these vulnerability databases.

The Severity score for vulnerabilities is typically derived from the Base Score in the Common Vulnerability Scoring System (CVSS). The Base Score itself is calculated based on the Exploitability and Impact metrics.

Here's a breakdown of how the Severity score is calculated:

Base Score Calculation
The Base Score in CVSS is calculated using the following formula:

Base Score = (0.6 * Impact) + (0.4 * Exploitability)

Impact: This component of the Base Score represents the potential impact of a successful exploit. It is derived from the Confidentiality Impact (C), Integrity Impact (I), and Availability Impact (A) metrics in CVSS, each of which is scored from 0 to 10.

Exploitability: This component of the Base Score represents the ease of exploitation. It is derived from the Attack Vector (AV), Attack Complexity (AC), Privileges Required (PR), User Interaction (UI), and Scope (S) metrics in CVSS, each of which is scored from 0 to 10.

Severity Mapping
Once the Base Score is calculated and mapped to a predefined Severity level. The mapping is typically as follows:

Base Score 0.0 - 3.9: Low Severity
Base Score 4.0 - 6.9: Medium Severity
Base Score 7.0 - 8.9: High Severity
Base Score 9.0 - 10.0: Critical Severity

These ranges are defined by the CVSS standard and are used to categorize vulnerabilities based on their potential impact and exploitability.

Environmental Metrics (Optional):
In some cases, environmental metrics such as the Environmental Score (EPSS Score) may also influence the Severity rating. These factors can modify the Base Score to reflect the risk in a particular deployment context.

In summary, the Severity score for vulnerabilities is calculated based on the Base Score, which is, in turn, calculated from the Impact and Exploitability metrics. The Severity score indicates the seriousness of a vulnerability, ranging from low to critical, based on its potential impact and ease of exploitation.

For more info, refer to the NVD links below:
https://nvd.nist.gov/vuln-metrics/cvss
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

https://www.first.org/epss/


How is EPSS calculated?

You can find the general calculation on EPSS in the link below:

https://www.cyentia.com/epss-version-2-is-out/

We are calculating using the tool from the below link derived from the above website:

https://epss.cyentia.com/epss_scores-current.csv.gz


Security and Compliance Report Card Grading

The table values below are used for our Security Report Card and Compliance Report Card grades.

 Category

Grades

Description

Antivirus

5

Anti-virus is installed and up to date

4

Anti-virus is installed but not up to date

1

Anti-virus is not installed

Local Firewall

5

Local firewall is enabled for both public and private networks

4

Local firewall is not enabled for private networks

3

Local firewall is not enabled

1

Local firewall is not enabled

Insecure Listening Ports

 5

There are no insecure listening ports

3

One insecure listening port detected

1

More than one insecure listening port detected

 Failed Login

5

No failed interactive logins in the past 7 days

4

7 or fewer failed interactive logins in the past 7 days

3

14 or fewer failed interactive logins in the past 7 days

1

15 or more failed interactive logins in the past 7 days

Network Vulnerabilities

5

No network vulnerabilities

4

Low network vulnerabilities found (CVSS < 4.0)

3

Medium network vulnerability found (CVSS >= 4.0)

1

Critical network vulnerability found (CVSS >= 9.0)

System Aging

5

All computers are less than 2 years old

4

Some computers between 3 and 4 years old

3

Some computers between 4 and 7 years old

1

Some computers over 8 years old

 Supported OS

5

All computers have supported Operating Systems

4

Some Operating Systems are in extended support

3

Some Operating Systems are within 1 year of end of life

1

Some unsupported Operating System

 LLMNR

2

LLMNR not Allowed

5

LLMNR Disabled

1

LLMNR Enabled

NBTNS

2

NBTNS not Allowed

5

NBTNS Disabled

1

NBTNS Enabled

 NTLMV1

2

NTLMV1 not Allowed

5

NTLMV1 Disabled

1

NTLMV1 Enabled

 SMBV1Server

2

SMBV1 Server not Allowed

5

SMBV1 Server Disabled

1

SMBV1 Server Enabled

SMBV1Client

 

 

2

SMBV1 Client not Allowed

5

SMBV1 Client Disabled

1

SMBV1 Client Enabled

 SMB Signing

2

SMB Signing Disabled

5

SMB Signing Enabled

1

SMB Signing Disabled

Security Report Card

image-20240429-144557.png

Compliance Report Card

image-20240429-144605.png

Need Support?

Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login

image-20240206-144508.png

  • No labels