How Vulnerable Are We?

Share and earn Cybytes
Facebook Twitter LinkedIn Email Vulnerability Management Reports

CISOs often ask “How vulnerable are we?” when presented with vulnerability metrics and reports. As the head of a security team, are you prepared to answer that question? The answer to that question often lies in the relationship between vulnerability and exploitability. All exploitable vulnerabilities are, of course, vulnerabilities. But when a vulnerability isn’t marked “exploitable,” what does that mean? The most accurate answer would be that an exploitation hasn’t been discovered yet, but the vulnerability still has the potential to be exploited.

CISOs often ask “How vulnerable are we?”™ helps you better understand the vulnerability of your network and your risk exposure with the data presented in the Critical and Exploitable Vulnerabilities report. helps you better understand the vulnerability of your network and your risk exposure

First, let’s clear up some terminology.


In computer security, a “vulnerability” is a weakness in the steps that are taken to secure a system that may allow unauthorized access to privileged data. In the simplest form, a misconfiguration of file level permissions can grant unauthorized users access to a file, folder, application, or service. In a more complex example, unpatched versions of SMB on Windows hosts allow attackers to bypass authentication and execute code remotely as demonstrated by the WannaCry ransomware. Regardless of how simple or complex the vulnerability, the question quickly becomes: can the vulnerability be exploited? leverages your scan data to provide accurate insight into all the vulnerabilities detected in your organization.


The term “exploit” is commonly used to describe software that has been developed to attack an asset by taking advantage of a vulnerability. The objective of many exploits is to gain control of an asset. For example, a successful exploit of a database vulnerability can provide an attacker with the means to collect or exfiltrate all the records from that database, resulting in a data breach. Exploits are also developed to attack a vulnerability in order to gain remote administrative privileges on a host. With, you can identify which hosts in your network have exploitable vulnerabilities, and prioritize remediation efforts accordingly.

Exploit frameworks

Security researchers know that to truly test and understand the nature of exploiting a vulnerability, an exploit framework is needed. An exploit framework is an abstraction in which the foundation of the software provides the generic functionality, and users can write code modules to perform specific tasks. For example, the developers of Metasploit, Core Impact and several others created exploit frameworks to leverage common attack techniques and delivery methods, while the users create the actual exploits. These exploit frameworks can be used by inexperienced attackers to create an attack that may look sophisticated because most of the difficult work has been created by the framework. For example, once you understand how to leverage the exploit framework to exploit a buffer overflow, replicating the attack seems trivial. The industry is seeing a rise in malware code that appears to have been developed using the various exploit frameworks as they become more popular. enables you to search for the presence of vulnerabilities in your network related to specific exploit frameworks.

The solution can easily identify systems that are more vulnerable and exploitable than other systems. The Critical and Exploitable Vulnerabilities report provides detailed information on these hosts. Critical and Exploitable Vulnerabilities report

The chapters in the Critical and Exploitable Vulnerabilities report give you a comprehensive list of the hosts on your network with critical or exploitable vulnerabilities identified during vulnerability scanning. Also included are the top ports being leveraged and lists of the most critical or exploitable vulnerabilities. All of this detailed information can be used to prioritize hosts and vulnerabilities for remediation.

The Critical Vulnerabilities tables in two of the chapters list the most pervasive exploitable and critical vulnerabilities. The vulnerabilities in these lists should be targeted for efficient remediation to effectively reduce the overall vulnerability and risk exposure of the network.

Critical Vulnerabilities table list

Regardless of your approach to mitigating risks identified by – by applying patches, configuring mitigation controls, or hardening operating systems – the first step is to clearly qualify the risks into actionable tasks and deliverables. provides information security professionals with the tools and resources needed to perform a detailed qualitative analysis of the risk that threatens business assets. The Critical and Exploitable Vulnerabilities report provides insight into your current risk exposure. Armed with, you’ll be prepared to provide an accurate answer the next time the CISO asks you how vulnerable your organization is.

Armed with, you’ll be prepared to provide an accurate answer the next time the CISO asks you how vulnerable your organization is

Try provides accurate information on how well your organization is addressing security risks, and helps track improvements over time. Get a free trial of Vulnerability Management for 60 days.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?