Grouped EPSS¶
Overview
Because EPSS is a probability (of exploitation in the next 30 days), other probabilities can be determined based on standard probability theory e.g.
- probability of exploitation in the next N days for 1 CVE
- e.g. this is used in NIST LEV calculations
- probability of exploitation in the next 30 days for several CVEs i.e. grouped EPSS (from 1 to many and typical usage is the CVEs on a given container/asset or other logical grouping). This is described in
- "3: EPSS Can Scale, to Produce System, Network, and Enterprise-level Exploit Predictions" in https://www.first.org/epss/user-guide
- Modeling Asset Risk Using Grouped EPSS at VulnCon 2025 by Stephen Shaffer.
Core Concept¶
Info
When you're looking at the probability of at least one vulnerability being exploited, it's easier to calculate the opposite:
What is the probability that none of the vulnerabilities are exploited?
Once you have that, you subtract it from 1 to get the probability that at least one is exploited.
This is based on the assumption that vulnerabilities are independent — the exploitation of one doesn't affect the others.
Formula¶
If you have N vulnerabilities with individual exploit probabilities \(P_1, P_2, ..., P_N\), then:
🟢 Probability that none are exploited:¶
🔴 Probability that at least one is exploited:¶
Simple Worked Example¶
Simple Worked Example
Let’s say a system has 3 vulnerabilities:
- Vulnerability A: 10% chance of being exploited → \(P_1 = 0.10\)
- Vulnerability B: 20% chance → \(P_2 = 0.20\)
- Vulnerability C: 15% chance → \(P_3 = 0.15\)
Step 1: Calculate the chance of no vulnerabilities being exploited:¶
Step 2: Calculate the chance of at least one being exploited:¶
So, there is a 38.8% chance that at least one vulnerability will be exploited.
Independence Assumption¶
What if Vulnerabilities are not independent?
If multiple systems in the group (that you're calculating Grouped EPSS for) share the same CVE, the assumption of independence is likely not valid — or at least weakened — because:
-
An attacker exploiting that CVE successfully on one system might increase their ability (or knowledge) to exploit it elsewhere.
-
Shared configurations, network access, or authentication could create a correlation between the vulnerabilities being exploited.
Scenario 1: Same CVE, Truly Independent Deployments¶
Imagine you have:
- 3 different machines or services,
- All vulnerable to CVE-XXXX-YYYY,
- Each independently patched, segmented, or exposed.
In this case, you can reasonably treat them independently. So the math above still applies:
Example: Three instances of CVE-2022-12345 with 10% chance each
Scenario 2: Same CVE, Shared System or Pathway¶
Now suppose:
- All three instances run on the same host or share an authentication mechanism.
- Once an attacker exploits it in one place, they can reuse access or credentials elsewhere.
Then the exploit events are dependent, and the original formula no longer holds.
You might see something like:
- One successful exploit causes all instances to be compromised (100% dependence).
- Or a partial dependence — e.g., exploiting one boosts others from 10% to 50%.
Warning
When vulnerabilities are not independent and there is a
- small number, e.g. 3, of the same vulnerability, then conditional probabilities can be used
-
large number of the same vulnerability, then calculating probabilities becomes complex!
- It would involve e.g. conditional probabilities, Bayesian networks, or Markov chains.
Calculating Conditional Probabilities With A Small Number Of Dependent Vulnerabilities¶
Let’s say you define:
- \(A\): event that system 1 is exploited
- \(B\): event that system 2 is exploited
Instead of computing \(P(A \cup B) = 1 - (1 - P(A))(1 - P(B))\), you’d now use:
Where:
And \(P(B | A) > P(B)\) if they’re positively correlated (as with the same CVE in a shared system).
Using Grouped EPSS¶
Using Grouped EPSS
Per Modeling Asset Risk Using Grouped EPSS, Grouped EPSS can be applied to
- Identify high risk assets based on the grouped probability of exploitation for that asset.
- Prioritize remediation efforts by identifying which CVEs, if addressed, would most significantly reduce the grouped EPSS score across assets.
- Utilize grouped EPSS as a decision support mechanism to allocate security efforts to the riskiest assets or groups, aligning with organizational priorities.
- Track the distribution of grouped EPSS scores over time to understand shifts in the organization's asset risk posture and the effectiveness of security interventions.
- Analyze your internal data to identify tipping points for specific assets, determining how many vulnerabilities need to be fixed to bring their grouped EPSS score below a desired threshold.
- Enrich asset data with internal data classification standards to combine likelihood (grouped EPSS) with potential impact for a comprehensive risk assessment.