How Does Edgescan Support NIST Likely Exploited Vulnerabilities (LEV)?
The NIST Likely Exploited Vulnerabilities (LEV) framework provides a structured approach to assess whether a vulnerability is likely to be exploited in the wild. This analysis considers factors such as evidence of exploitation, technical impact, and system exposure to determine prioritization.
Version Number: v1.0.0
Published Date: 10 Sept 2025
____________________________________________________________________________
As part of Edgescan’s AI Insights, organizations gain access to the NIST Likelihood of Exploitability (LEV) score for their top five vulnerabilities. This metric provides a data-driven estimate of how likely a given vulnerability is to be exploited in the wild, enabling security teams to move beyond severity alone and prioritize remediation based on real-world risk.
How It Works
-
Data Correlation
AI Insights aggregates data from multiple trusted sources, including NIST, CIS, CVE data, first.org, vulnerability feeds, threat intelligence, and Edgescan’s validated findings. -
LEV Calculation
The NIST LEV score is applied to the top five vulnerabilities affecting the environment. This score reflects the probability of exploitation, based on observed attacker behavior and contextual threat data. -
Prioritized Insights
The system highlights which vulnerabilities have the highest likelihood of being exploited and surfaces them as part of the AI Insights with a decision tree as to what action should be taken.
You can select the vulnerability to present in the top right of the Insight, it will only show the top 5 vulnerabilities within your organisation.
The decision tree will show the steps and the conclusion of the LEV analysis.