Skip to content
English
  • There are no suggestions because the search field is empty.

How Does Edgescan Support NIST Likely Exploited Vulnerabilities (LEV)?

The NIST Likely Exploited Vulnerabilities (LEV) framework provides a structured approach to assess whether a vulnerability is likely to be exploited in the wild. This analysis considers factors such as evidence of exploitation, technical impact, and system exposure to determine prioritization. 

Version Number: v1.0.0

Published Date: 10 Sept 2025

____________________________________________________________________________

As part of Edgescan’s AI Insights, organizations gain access to the NIST Likelihood of Exploitability (LEV) score for their top five vulnerabilities. This metric provides a data-driven estimate of how likely a given vulnerability is to be exploited in the wild, enabling security teams to move beyond severity alone and prioritize remediation based on real-world risk.

How It Works

  1. Data Correlation
    AI Insights aggregates data from multiple trusted sources, including NIST, CIS, CVE data, first.org, vulnerability feeds, threat intelligence, and Edgescan’s validated findings.

  2. LEV Calculation
    The NIST LEV score is applied to the top five vulnerabilities affecting the environment. This score reflects the probability of exploitation, based on observed attacker behavior and contextual threat data.

  3. Prioritized Insights
    The system highlights which vulnerabilities have the highest likelihood of being exploited and surfaces them as part of the AI Insights with a decision tree as to what action should be taken.

 

You can select the vulnerability to present in the top right of the Insight, it will only show the top 5 vulnerabilities within your organisation.

The decision tree will show the steps and the conclusion of the LEV analysis.