Overview
Not all vulnerabilities are equally dangerous. Some are theoretical—no one has figured out how to exploit them yet—while others are being actively used by attackers right now. The Exploit Signals system helps you answer one critical question:“How likely is this vulnerability to be exploited in the real world?”
Why Exploit Signals Matter
Traditional severity scores (Critical, High, Medium, Low) tell you how bad a vulnerability could be if exploited. Exploit signals tell you how likely it will be exploited based on:- Active exploitation in the wild
- Availability of proof-of-concept (PoC) code
- Weaponized exploit tools
- Technical ease of exploitation
How It Works
When vulnerability reports are uploaded to Backline, the system automatically:- Gathers threat intelligence from multiple public data sources
- Calculates scores using a weighted formula
- Classifies exploitability as YES, UNCERTAIN, NO, or N/A
- Displays signals in your vulnerability dashboard
Calculation happens asynchronously after report upload. Vulnerabilities show “CALCULATING” status initially, then update with final signals within minutes.
Understanding Exploitability Classifications
Backline classifies vulnerabilities into four exploitability categories:YES - Exploitable
There’s proof-of-concept code or active exploitation happening.
- Score ≥ 60 with PoC or active exploitation
- Confirmed exploitable in the wild
UNCERTAIN - Moderate Signals
Some indicators exist, but exploitation isn’t confirmed.
- Score 40-59, or edge cases
- Indicators present but not definitive
NO - Unlikely
No evidence of exploitation yet.
- Score < 40 without PoC or active exploitation
- Limited exploitability signals
N/A - Insufficient Data
No vulnerability intelligence available.
- Very new or obscure vulnerabilities
- Insufficient data to calculate score
The Score Calculation
Exploitability scores are calculated using a weighted formula that combines multiple threat intelligence signals. Each signal contributes points to the final score (0-100):Signal Components
Active Exploitation (30 points)
Active Exploitation (30 points)
Weight: 30 points (highest priority)Indicates if the vulnerability is actively being exploited in the wild.
- Source: CISA Known Exploited Vulnerabilities (KEV) catalog
- Why it matters: Active exploitation means attackers are using this vulnerability right now
Proof-of-Concept Available (25 points)
Proof-of-Concept Available (25 points)
Weight: 25 pointsIndicates if working exploit code is publicly available.
- Sources: Public exploit databases and repositories
- Why it matters: Public exploit code dramatically lowers the barrier for attackers
Weaponized Tooling (15 points)
Weaponized Tooling (15 points)
Weight: 15 pointsIndicates if easy-to-use exploit tools exist in penetration testing frameworks.
- Sources: Exploitation frameworks and toolkits
- Why it matters: Weaponized tools make exploitation trivial, even for low-skill attackers
Security Research Available (15 points)
Security Research Available (15 points)
Weight: 15 pointsIndicates if detailed security research or technical analysis exists.
- Sources: Security advisories, technical publications, research papers
- Why it matters: Deep technical analysis confirms exploitability and provides attack paths
Ease of Exploitation (15 points)
Ease of Exploitation (15 points)
Weight: 15 pointsMeasures how technically difficult the vulnerability is to exploit, derived from CVSS vector components.
- Source: CVSS vector from scanner reports
- Components considered:
- Attack Vector: Network, Adjacent, Local, or Physical
- Attack Complexity: Low or High
- Privileges Required: None, Low, or High
- User Interaction: None or Required
CVSS:3.1/AV:N/AC:L/PR:N/UI:N (network, low complexity, no privileges, no interaction) → +15 pointsExample: CVSS:3.1/AV:L/AC:H/PR:H/UI:R (local, high complexity, high privileges, interaction required) → +3.75 pointsEPSS Fallback
When no threat intelligence signals are found but EPSS data is available, Backline uses the EPSS probability as a fallback score. EPSS (Exploit Prediction Scoring System) is a machine learning-based probability (0-100%) that predicts the likelihood of exploitation in the next 30 days. Example: EPSS probability of 0.42 (42%) becomes a score of 42Classification Logic
After computing the score, Backline applies classification rules:YES - Exploitable
YES - Exploitable
Score ≥ 60 AND (Proof-of-Concept exists OR Active exploitation detected)
UNCERTAIN - Moderate Signals
UNCERTAIN - Moderate Signals
Score between 40-59, or edge cases where indicators are mixed
NO - Unlikely
NO - Unlikely
Score < 40 AND No PoC AND No active exploitation
N/A - Insufficient Data
N/A - Insufficient Data
No data available from any threat intelligence source
Real-World Examples
Example 1: Log4Shell (CVE-2021-44228) 🔥
Context: One of the most critical vulnerabilities in recent history Threat Intelligence Signals:- ✅ Active Exploitation: Listed in CISA KEV catalog
- ✅ Proof-of-Concept: Multiple PoCs available publicly
- ✅ Weaponized Tools: Exploit modules exist in public frameworks
- ✅ Research: Extensive security research and writeups
- CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N
Example 2: Local Privilege Escalation with PoC ⚠️
Context: A privilege escalation vulnerability with public exploit code but limited scope Threat Intelligence Signals:- ❌ Active Exploitation: Not in KEV
- ✅ Proof-of-Concept: Public PoC code available
- ❌ Weaponized Tools: No exploit modules yet
- ✅ Research: Technical blog post with analysis
- CVSS Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N
Example 3: EPSS Fallback - No Evidence Yet 📈
Context: Recently disclosed, no exploits, but EPSS suggests rising risk Threat Intelligence Signals:- ❌ Active Exploitation: Not in KEV
- ❌ Proof-of-Concept: No PoCs found
- ❌ Weaponized Tools: No exploit modules
- ❌ Research: Only basic disclosure
- EPSS: 0.78 (78% probability)
- CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N