Every vulnerability management program needs a prioritization framework. The question is which one - and increasingly, the answer is "more than one."
Four frameworks dominate the conversation: CVSS, EPSS, SSVC, and KEV. Each answers a different question. Each has strengths and blind spots. And none of them, individually, gives you what you actually need: a prioritization that reflects the real risk in your specific environment.
This guide breaks down what each framework does, where it falls short, and how to think about combining them - including the dimension none of them cover.
What it measures: Intrinsic severity - how bad a vulnerability could be under worst-case conditions.
Current version: CVSS v3.1 (v4.0 released 2023, adoption still growing)
How it works: A vector of metrics - attack vector, attack complexity, privileges required, user interaction, scope, and impact (confidentiality, integrity, availability) - produces a score from 0.0 to 10.0.
Scoring bands:
| Band | Range |
|---|---|
| Critical | 9.0 - 10.0 |
| High | 7.0 - 8.9 |
| Medium | 4.0 - 6.9 |
| Low | 0.1 - 3.9 |
Strengths:
Weaknesses:
The efficiency problem: FIRST's analysis shows that remediating all CVSS 7.0+ vulnerabilities requires addressing 57.4% of all vulnerabilities but catches only 82.2% of those that are actually exploited [2]. That's a lot of effort for incomplete coverage.
Best used for: Establishing a baseline severity. Useful as one input, not as the sole prioritization mechanism.
What it measures: Probability that a vulnerability will be exploited in the wild within the next 30 days.
Current version: EPSS v4 (released March 2025)
How it works: A machine learning model trained on historical exploitation data, CVE characteristics, and exploit intelligence signals. Produces a probability (0.0 to 1.0) for each CVE, updated daily.
Performance: ROC AUC of 0.838 [2]. Significantly better than random and demonstrably better than CVSS at predicting actual exploitation.
Strengths:
Weaknesses:
Best used for: Adding exploitation likelihood to your prioritization. Dramatically more efficient than CVSS alone. Best combined with environmental context.
What it measures: What action to take, based on a decision tree that considers exploitation status, technical impact, and stakeholder-specific context.
Developed by: Carnegie Mellon's Software Engineering Institute (SEI), adopted by CISA.
How it works: Instead of a numeric score, SSVC produces an action recommendation: Act, Attend, Track, or Track* - based on decision points:
| Decision Point | Options |
|---|---|
| Exploitation | None / PoC / Active |
| Automatable | Yes / No |
| Technical Impact | Partial / Total |
| Mission Prevalence | Minimal / Support / Essential |
| Public Well-Being Impact | Minimal / Material / Irreparable |
CISA publishes its own SSVC decision tree for federal agencies [3].
Strengths:
Weaknesses:
Best used for: Establishing organizational decision policies. Excellent as a framework for defining "what do we do about Act vs. Attend," less useful as a real-time scoring mechanism at scale.
What it measures: Confirmed active exploitation - a vulnerability is in KEV only if CISA has evidence of active exploitation in the wild.
Maintained by: Cybersecurity and Infrastructure Security Agency (CISA)
How it works: CISA adds CVEs to the KEV catalog when they have reliable evidence of active exploitation. Federal agencies are mandated to remediate KEV entries within specified timelines (typically 14-21 days). Non-federal organizations increasingly use KEV as a prioritization input.
2025 data: 884 KEVs added during 2025 [4]. 28.96% were exploited on or before disclosure day [4].
Strengths:
Weaknesses:
Best used for: Absolute minimum baseline. If it's in KEV and you're affected, remediate. But KEV alone misses too much to be a complete strategy.
| Dimension | CVSS | EPSS | SSVC | KEV |
|---|---|---|---|---|
| What it answers | How severe is this? | How likely is exploitation? | What action should I take? | Is this being exploited? |
| Score type | 0-10 numeric | 0-1 probability | Act/Attend/Track | Binary (in catalog or not) |
| Dynamic | No | Yes (daily) | Partially (exploitation status) | Yes (as entries are added) |
| Exploitation-aware | No | Yes | Yes | Yes (confirmed only) |
| Environment-aware | No (v4.0 adds optional metrics) | No | Partially (mission prevalence) | No |
| Scales to real scanner volume | Yes | Yes | Partially (manual inputs) | N/A (only ~900/year) |
| Effort efficiency | Low (57% effort → 82% coverage) | High (2.7% effort → 63% coverage) | Medium | Very high (but only ~2% of CVEs) |
| Tooling support | Universal | Growing | Nascent | Growing |
CVSS, EPSS, SSVC, and KEV are all external signals. They tell you what's true about a vulnerability in the world: how severe it is, how likely exploitation is, whether it's being actively exploited, what action category it falls into. Every vulnerability management program needs them.
But external signals don't know your environment. They can't tell you whether a CVE is actually exploitable on your hosts, how an attacker would reach it, or what's at stake if they did. Those answers come from internal signals: your network topology, your configurations, your exposure surface, your business context.
A CVE can score CVSS 9.8, EPSS 0.9, SSVC "Act," and appear in KEV, and still not be exploitable on your host because:
That's the gap. External signals tell you what could happen somewhere. Internal signals tell you what applies here.
Condition-level verification is the first internal signal: for each vulnerability on each resource, it checks whether the specific exploitation conditions are met, with full audit trail from OSINT source to test plan to verdict. The output isn't a score or a probability. It's a binary answer grounded in your environment: exploitable or not.
Internet exposure, critical resource exposure, and business impact are the other internal signals: how reachable is the vulnerability, what's downstream if it's exploited, and how much does the organization care about what's at risk.
When you combine both:
| Signal type | Signal | Question |
|---|---|---|
| External | CVSS | How severe is this? |
| External | EPSS | How likely is exploitation? |
| External | KEV | Is this being exploited in the wild? |
| External | SSVC | What action category? |
| Internal | Exploitability verification | Are the conditions met on this host? |
| Internal | Internet exposure | How reachable is it? |
| Internal | Critical resource exposure | What's downstream? |
| Internal | Business impact | How much does it matter? |
External signals are publicly available for every CVE. Internal signals require knowledge of your environment. The programs that combine both have a prioritization that reflects actual risk, not theoretical severity or aggregate probability.
If you're using CVSS alone: Add EPSS immediately. It's free, API-available, and dramatically more efficient. A CVSS 9.8 with EPSS 0.01 is a different priority than a CVSS 7.0 with EPSS 0.8.
If you're using CVSS + EPSS: Add KEV as a hard filter. Any KEV entry in your environment gets immediate attention. Then start asking the internal signal questions: which of your high-EPSS, high-CVSS findings are actually reachable, and what's downstream?
If you're using CVSS + EPSS + KEV: The next leverage point is exploitability verification. Confirming which findings have exploitation conditions met in your environment eliminates the largest category of wasted effort: high-severity, high-probability findings that aren't actually exploitable on your hosts.
If you want the full picture: Combine all external signals with all internal signals. Verify exploitability, map exposure and blast radius, weight by business impact. Score at the component level. Surface remediation options. That's where vulnerability management becomes risk management.
[1] Gamblin, J. (2026, January 1). "2025 CVE Data Review." https://jerrygamblin.com/2026/01/01/2025-cve-data-review/
[2] FIRST. "Exploit Prediction Scoring System (EPSS)." https://www.first.org/epss/
[3] CISA. "Stakeholder-Specific Vulnerability Categorization (SSVC)." https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc
[4] VulnCheck. (2026). "State of Exploitation 2026." https://www.vulncheck.com/blog/state-of-exploitation-2026