EPSS KEV Risk Scoring

EPSS + KEV + Enterprise Context: The New Vulnerability Scoring Stack

A full breakdown of the three-layer vulnerability scoring model that's replacing CVSS-only prioritization across the industry, and how to implement it in your program today.

CVEasy AI Research Team·February 18, 2026·10 min read
CVEasy AI, Correlated vulnerability scoring

Vulnerability scoring has evolved significantly since CVSS was introduced in 2005. Two major additions, EPSS (2019) and the CISA KEV catalog (2021), have given security teams the raw materials to build a genuinely predictive prioritization model. The challenge is knowing how to weight and combine them.

This article breaks down each layer of the scoring stack, explains the data sources and update cadences, and walks through the CVEasy TRIS™ score formula that combines all three.

Layer 1: CVSS, The Severity Foundation

CVSS (Common Vulnerability Scoring System) v3.1 scores vulnerabilities on a 0–10 scale based on six base metrics:

CVSS is published by NVD within days of CVE creation and is available for all ~240,000 CVEs in the NVD database. It's the most comprehensive and consistent scoring signal available, which is why it remains a useful foundation, not as a final answer, but as a starting filter.

Use CVSS to set scope. Use EPSS and KEV to set order. Use enterprise context to set urgency.

Layer 2: EPSS, The Exploitation Probability Signal

EPSS (Exploit Prediction Scoring System) is maintained by FIRST and published daily. Each CVE receives a score between 0 and 1 representing the probability of exploitation in the wild within the next 30 days.

How EPSS Is Calculated

EPSS v3 (released 2023) is a machine learning model trained on data from multiple sources:

The model outputs a probability and a percentile. The percentile is often more useful than the raw probability, a CVE at the 95th percentile is more concerning than one at the 70th, regardless of whether the absolute probability is 0.4 or 0.9.

EPSS Update Cadence and Delta Tracking

EPSS updates daily. A CVE that was at EPSS 0.01 last Monday can jump to 0.6 this Monday if a working PoC is published over the weekend. Tracking EPSS delta, the rate of change over time, is more valuable than tracking the current score in isolation.

A 7-day EPSS delta ≥ 0.2 is a strong signal that exploitation development is underway. In practice, this pattern precedes KEV listing by 3–14 days in the majority of cases.

Layer 3: KEV, The Confirmed Exploitation Signal

The CISA Known Exploited Vulnerabilities (KEV) catalog is the most unambiguous signal available: these CVEs are being actively exploited in the wild, confirmed by CISA. New entries are added multiple times per week.

KEV should be treated as a binary override signal, not a scoring component. Any KEV entry immediately jumps to your highest priority tier regardless of CVSS or EPSS score. The question is no longer "is this risky?", CISA has answered that. The question is "how fast can we mitigate it?"

Layer 4: Enterprise Context, The Organization-Specific Multiplier

The first three layers are population-level signals. They tell you what's dangerous to organizations in general. The fourth layer converts that to risk for your organization specifically.

Industry Exposure Multipliers

Different industries face different threat actors with different toolkits. CVEasy AI applies industry-specific multipliers calibrated to known threat actor targeting patterns:

// Industry exposure multipliers (applied to base score)
healthcare
: 1.4x // HIPAA + ransomware targeting
financial
: 1.35x // PCI-DSS + sophisticated threat actors
critical_infra
: 1.4x // Nation-state targeting
government
: 1.3x // FedRAMP compliance obligations
technology
: 1.2x // Supply chain risk
retail
: 1.15x // PCI-DSS + e-commerce targeting
general
: 1.0x // Baseline

Compliance Obligation Weighting

Compliance frameworks create legal and regulatory risk on top of operational risk. A vulnerability that could cause a HIPAA breach or PCI-DSS fine carries additional organizational cost beyond the direct security impact. Compliance flags add a risk premium to affected CVEs.

Asset Criticality

A vulnerability affecting your patient records database is categorically different from the same CVE in a dev environment. Even a rough three-tier asset classification (crown jewel / business critical / low value) applies a meaningful multiplier.

The CVEasy TRIS™ score Formula

// CVEasy TRIS™ score, 0 to 95
baseScore = CVSS × 9.5 // normalized to 0-95 range
epssBoost = epssScore × 25 // 0-25 points from exploitation probability
kevMultiplier = isKEV ? 1.4 : 1.0 // hard 40% boost for confirmed exploitation
industryMult = getIndustryMultiplier(industry) // 1.0–1.4
complianceMult = hasComplianceFlag ? 1.15 : 1.0
assetMult = getAssetCriticalityMultiplier(asset) // 0.7–1.5
score = min(95, (baseScore + epssBoost) × kevMultiplier × industryMult × complianceMult × assetMult)

Score Band Interpretation

Score RangeBandAction
75–95CRITICALImmediate response, 72-hour SLA
50–74HIGHExpedited triage, 14-day SLA
25–49MEDIUMStandard triage, 30-day SLA
0–24LOWNext patch cycle or dismiss
CVEasy AI computes this automatically for every CVE in your environment, updating in real time as EPSS scores refresh, KEV catalog updates, and your asset/compliance configuration changes. The TRIS™ score panel on each CVE detail page shows the full breakdown, CVSS contribution, EPSS boost, KEV multiplier, industry and compliance weighting, so your analysts understand exactly why a CVE scored the way it did.

The scoring stack isn't magic. It's systematic application of publicly available threat intelligence, calibrated to your specific organizational risk profile. The organizations that implement this model consistently report the same outcome: fewer vulnerabilities to chase, faster response on the ones that matter, and a dramatic reduction in breach risk from exploitable CVEs.

See the Full Scoring Stack in Action

Every CVE automatically enriched with EPSS, KEV, and your TRIS™ score, running locally on your hardware, no cloud required.