TRIS. TrueRisk Intelligence Score

Stop Drowning in
CVSS Noise

TRIS v2 scores every vulnerability across 12 layers of contextual intelligence, including five dimensions no competitor has. Know exactly what to patch first.

7
Intelligence Layers
5
Priority Bands
330K+
CVEs Scored
85%
Noise Reduction

CVSS Is Lying to Your Team

When everything is "critical," nothing is. Your analysts are drowning in noise while real threats hide in the backlog.

59,000+
CVEs Published in 2026
Critical
17,700
High
14,160
Medium
16,520
Low
10,620

Based on CVSS alone, nearly 30% are "Critical"

The CVSS-Only Trap

CVSS was designed to measure technical severity, not business risk. It tells you HOW BAD a bug could be, not whether anyone is actually exploiting it or if it even affects your environment.

The result? Security teams burn weeks patching theoretical "Critical" vulnerabilities while actively exploited, moderate-scoring bugs slip through.

  • 30% of CVEs rated "Critical" have zero known exploits
  • Average team wastes 40% of patching cycles on low-real-risk items
  • SLA violations spike when everything has the same urgency label
  • Alert fatigue causes analysts to miss the vulns that actually matter

The 12 Layers of TRIS v2

Every vulnerability is evaluated across twelve intelligence dimensions. Seven originated in TRIS v1 and remain core to the model. Five are brand new in TRIS v2, and no other scoring system combines them. Read the v2 white paper →

KEV Status

Confirmed active exploitation from the CISA Known Exploited Vulnerabilities catalog. If attackers are using it in the wild right now, it moves to the top of your queue.

20%
Weight

CVSS Base Score

Technical severity straight from NVD. The starting point, but never the final answer. Attack vector, complexity, privileges required, and impact are all factored in.

15%
Weight

EPSS Probability

Machine learning-based exploitation probability from FIRST.org. Predicts the likelihood a vulnerability will be exploited in the next 30 days using real-world threat data.

15%
Weight

Business Impact

Asset criticality combined with sector-specific targeting intelligence. A vuln in your payment processing server matters more than the same vuln on a dev sandbox.

15%
Weight

Threat Pressure

Combined attacker score from active campaigns, exploit kit availability, proof-of-concept code, dark web chatter, and threat actor interest. Real-time signal, not static data.

15%
Weight

Asset Exposure

Your actual scanner data mapped against affected assets. Internet-facing, DMZ, internal-only, air-gapped. A network-exploitable vuln on an internet-facing host is radically different from the same CVE on an isolated system.

10%
Weight

Temporal Factors

How long the vuln has existed, exploit maturity trajectory, patch availability, wormability indicators, and velocity of exploit development. Fresh zero-days score differently than 5-year-old bugs.

10%
Weight
New in TRIS v2 · Patent Pending

Five Dimensions No Competitor Has

TRIS v2 adds five entirely novel scoring layers. No other vulnerability scoring system. CVSS, EPSS, SSVC, Tenable VPR, Qualys TruRisk, or Picus PXS, combines any of these five dimensions, let alone all of them.

Attack Path Blast Radius L8 · New

Graph-based lateral movement modeling. TRIS v2 models your network as a directed graph and quantifies how many assets a vulnerability can reach, how many pivot paths exist to crown-jewel systems, and topological proximity to Tier 1 assets. No competitor models attack paths at all.

NOVEL
TRIS v2 only

Supply Chain Propagation L9 · New

SBOM-aware transitive risk. TRIS v2 ingests your software bill of materials and quantifies how deep a vulnerability sits in your dependency tree, how many applications are transitively affected, and whether a fixed version exists. Log4Shell-class events, modeled properly. Zero competitor coverage.

NOVEL
TRIS v2 only

Defense Efficacy Coefficient L10 · New

MITRE ATT&CK technique coverage mapping. TRIS v2 maps each CVE's exploitation chain to ATT&CK techniques and scores the percentage your defenses actually cover, freshness-weighted by BAS validation age. Answers the question no other scoring system asks: how well defended are we against this specific chain?

NOVEL
TRIS v2 only

Predictive Threat Trajectory L11 · New

Forward-looking momentum modeling. Where EPSS predicts probability, TRIS v2 predicts acceleration. Tracks week-over-week changes in exploit development, dark-web chatter, public PoC commit velocity, and fork activity. Identifies fast-movers before they hit the KEV catalog.

NOVEL
TRIS v2 only

Financial Impact (FAIR) L12 · New

FAIR-based dollar-value risk quantification. TRIS v2 translates technical severity into expected monetary loss: primary loss (IR, forensics, containment), secondary loss (GDPR/HIPAA/PCI fines, notification, legal), and productivity loss (downtime against measured per-hour revenue). Finally, a number the board understands.

NOVEL
TRIS v2 only

Same CVE. Different Conclusions.

See how TRIS transforms a panic-inducing CVSS score into an actionable, contextualized priority.

CVSS Score Only
9.8
CRITICAL
CVE-2024-38063

Windows TCP/IP Remote Code Execution. CVSS says: drop everything and patch immediately across your entire fleet.

  • No exploit context considered
  • No asset exposure data
  • No business impact weighting
  • No threat intelligence
  • Same score for every environment
vs
TRIS Score
28
LOW PRIORITY
CVE-2024-38063

TRIS v2 evaluated 12 layers and determined: this is not an emergency for YOUR environment right now.

  • Not in CISA KEV catalog
  • EPSS: 0.04% exploitation probability
  • No public exploit code available
  • Your affected hosts are internal-only
  • IPv6 stack disabled on your network

This is one example. Every organization gets different TRIS scores based on their unique asset exposure, business context, and threat landscape.

Five Priority Bands. Zero Ambiguity.

TRIS maps every vulnerability into actionable SLA bands so your team always knows the timeline.

85 - 95
CRITICAL PRIORITY Patch in 24-72 hours
65 - 84
HIGH PRIORITY Patch in 2 weeks
45 - 64
MEDIUM Patch this quarter
25 - 44
LOW Next release cycle
0 - 24
MONITOR Accept risk

SLA windows are defaults. Fully configurable per organization, asset group, or compliance framework.

TRIS vs CVSS vs EPSS

Each scoring system was designed with a different purpose. TRIS combines the best of both and adds five more dimensions.

Capability TRIS™ CVSS v3.1/4.0 EPSS
Technical severity
Exploitation probability
Active exploitation (KEV)
Business context
Your asset exposure
Threat campaign data Partial
Temporal / exploit maturity Optional metric
Actionable SLA bands 5 bands with timelines 4 static labels Raw percentage
Environment-specific Unique per org Same for everyone Same for everyone
Auto-remediation guidance AI-generated

CVSS and EPSS are valuable inputs. TRIS v2 uses both as part of its 12-layer scoring. The difference is that TRIS v2 also adds your environment, your business, real-time threat data, attack-path analysis, supply-chain propagation, defense efficacy, predictive trajectory, and FAIR-based financial impact.

Prioritize, Then Fix

Once TRIS tells you what to patch first, CVEasy AI generates the exact fix commands for your operating systems.

AI-Generated Remediation Per OS

TRIS scoring does not stop at prioritization. For every vulnerability that needs action, CVEasy AI's local LLM generates step-by-step remediation tailored to your actual environment.

  • OS-specific patch commands (Ubuntu, RHEL, CentOS, Windows, macOS)
  • Pre-patch verification steps to avoid breaking changes
  • Rollback procedures if something goes wrong
  • Compensating controls when patching is not immediately possible
  • Bulk remediation scripts for fleet-wide deployment
  • Generated 100% locally, never touches external APIs
# TRIS Score: 91. CRITICAL PRIORITY
# CVE-2026-21974. OpenSSH Pre-Auth RCE
# Affected: 14 internet-facing hosts

$ cveasy remediate CVE-2026-21974

# --- Ubuntu 22.04 / 24.04 ---
sudo apt update
sudo apt install openssh-server=1:9.6p1-3ubuntu1
sudo systemctl restart sshd

# --- RHEL 9 / CentOS Stream ---
sudo dnf update openssh-server
sudo systemctl restart sshd

# --- Verify fix ---
ssh -V
OpenSSH_9.6p1, OpenSSL 3.2.1

# --- Compensating control ---
# If patching is delayed:
sudo ufw deny from any to any port 22
sudo ufw allow from 10.0.0.0/8 to any port 22
Restrict SSH to internal network only

Stop guessing.
Start knowing.

See how TRIS v2 scoring transforms your vulnerability management program. 12 layers of intelligence. One clear answer.

Request a Demo → Contact Sales