EPSS
What is the Exploit Prediction Scoring System?
Back to Cybersecurity Explained
π What Is EPSS?
The Exploit Prediction Scoring System (EPSS) is a free, data-driven model that estimates the probability a published CVE will be exploited in the wild within the next 30 days. Scores range from 0 to 1 (0% β 100%) and are refreshed daily for every known CVE.
Where CVSS measures the severity of a vulnerability based on its characteristics, EPSS measures likelihood of exploitation based on real-world signals. A vulnerability can be critical by CVSS but have a near-zero EPSS score β meaning attackers are not actively targeting it.
EPSS is maintained by FIRST and powered by a machine-learning model trained on inputs including CVSS metrics, CWE weakness type, exploit code availability (Exploit-DB, GitHub, Metasploit), presence on CISA KEV, and live exploitation telemetry from honeypots and IDS/IPS sensors.
π§ͺ Real-World Example
As of October 2023, the NVD contained over 139,000 CVEs with CVSS 3.x scores. In any given 30-day window, only about 2.7% of those CVEs showed active exploitation. Using CVSS β₯7 to prioritize would capture 82% of exploited CVEs β but require patching 57% of all vulnerabilities. Using EPSS β₯10% captures 63% of exploited CVEs while targeting only 2.7% of the total β making remediation far more efficient.
β Key Takeaways
- EPSS scores are probabilities (0β1), not severity ratings β a score of 0.94 means a 94% chance of exploitation in the next 30 days
- Pair EPSS with CVSS: high severity + high EPSS = patch immediately; high severity + low EPSS = monitor and schedule
- CISA KEV entries tend to have high EPSS scores β if a CVE is on KEV, treat it as urgent regardless
- EPSS data is free and available via CSV download or API at
api.first.org/data/v1/epss - There is no single βrightβ threshold β organizations with limited resources should optimize for efficiency; mission-critical environments should optimize for coverage
- EPSS is not a guarantee: it predicts likelihood, not certainty β unknown exploits and targeted attacks can still affect low-scoring CVEs