Blog

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

By Tiffany Bergeron • February 13, 2025

Project banner

Historically, vulnerability management and threat management have been separate disciplines, but in a risk-focused world, they need to be brought together. Defenders struggle to integrate vulnerability and threat information and lack a consistent view of how adversaries use vulnerabilities to achieve their goals. Without this context, it is difficult to appropriately prioritize vulnerabilities.

Back in 2021, the Center for Threat-Informed Defense, developed a methodology to use the adversary behaviors described in MITRE ATT&CK® to characterize the impact of vulnerabilities from CVE® in order to bridge vulnerability management and threat management. Vulnerability reporters and researchers can use the methodology to describe the impact of vulnerabilities more clearly and consistently. When used in a vulnerability report, ATT&CK’s tactics and techniques enable defenders to quickly understand how a vulnerability can impact them, helping defenders integrate vulnerability information into their risk models and identify appropriate compensating security controls.

This methodology aims to establish a critical connection between vulnerability management, threat modeling, and compensating controls. CVEs linked to ATT&CK techniques can empower defenders to better assess the true risk posed by specific vulnerabilities in their environment. When we first applied this methodology, it became clear that mapping all CVEs to ATT&CK was not feasible. As of this publication, there are more than 240,000 CVE Records. Trying to protect against every vulnerability on the list is cost-ineffective and daunting, if not impossible. To help the cyber community keep pace with threat activity and manage vulnerabilities, Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerabilities (KEV) Catalog, the authoritative source of CVEs that have been confirmed as being exploited.

To help focus defenders on this subset of CVEs, we created the Prioritize Known Exploited Vulnerabilities (PKEV) project in collaboration with Center participants, including AttackIQ, Citigroup, HCA Healthcare, JPMorgan Chase Bank N.A., and Microsoft Corporation. With PKEV, defenders make threat-informed vulnerability management and risk management decisions by focusing resources on relevant, active exploits, saving both time and money.

The resources for the project — mappings, ATT&CK Navigator layers, and the mapping methodology — are all available in Mappings Explorer. Mappings Explorer enables defenders to access and explore the Center’s mapped security frameworks, bridging the gap between risk management and threat informed defense.

Vulnerability + Exploit = Impact

The Center’s mapping methodology for KEVs categorizes attack steps by method of exploitation, primary impact, and secondary impacts of exploitation. Using these categories, we create a vulnerability impact description template such as: The vulnerability allows the attacker to use [Exploitation Technique] which enables the [Primary Impact], which leads to [Secondary Impact].

Mapping Methodology

Mapping Methodology
To apply a threat-informed approach for the PKEV mappings, the team researched published methods of the exploitation and impact of each vulnerability, and excluded theoretical or proof-of-concept exploits. This information was analyzed to create CVE/KEV mappings to specific ATT&CK (sub-)techniques based on the identified adversary attack steps identified.

Our team prioritized mapping the KEV Catalog by frequency and recency, resulting in about 800 mappings for over 400 CVEs. The most exploited KEVs as determined by inclusion in CISA’s Top Routinely Exploited Lists for years 2020 through 2023 are included in the mapping repository. The KEV Catalog includes vulnerabilities going back to 2002; mapping priority was given to more recent vulnerabilities by CVE date (2021 on).

Defend Against Exploitation Techniques

In 2024, Checkpoint disclosed CVE-2024-24919, which is a path traversal exploit that allows an adversary to execute root-level commands on the affected device. This is the exploitation technique, mapped to T1202: Indirect Command Execution.

Map CVE to Exploitation Technique
Map CVE to Exploitation Technique

After the CVE was released, security research firm, Greynoise, saw malicious actors exploiting the vulnerability which enabled them to search the local file system for sensitive data. This is the primary impact of the exploit, mapped to T1005: Data from Local System.

Map Exploitation Technique to Primary Impact
Map Exploitation Technique to Primary Impact

The malicious actors were then seen reading, and presumably exfiltrating, data from various sensitive files like /etc/shadow and .ssh/authorized_keys, both of which contain information related to user authentication. Another security research firm, Mnemonic, has seen malicious actors exploiting this vulnerability to access Active Directory credentials by extracting ntds.dit.

These three observed techniques are the secondary impact, respectively mapped to T1003.008: OS Credential Dumping: /etc/passwd and /etc/shadow, T1552.004: Unsecured Credentials: Private Keys, and T1003:003: OS Credential Dumping: NTDS.

Map Primary Impact to Secondary Impacts
Map Primary Impact to Secondary Impacts

By applying the mapping methodology, we have created the vulnerability impact description:

Vulnerability Impact Description for CVE-2024-24919
Vulnerability Impact Description for CVE-2024-24919

Use PKEV to Stay Threat-Informed

PKEV characterizes the exploitation and impact of vulnerabilities using the adversary behaviors described in ATT&CK. This connects vulnerability management, threat modeling, and compensating controls. A threat-informed approach to vulnerability and risk management:

  • Informs defenders on what techniques an adversary might use to exploit a vulnerability
  • Creates a clear way to describe the impacts and exploitation methods of vulnerabilities
  • Prioritizes mitigation efforts on the subset of vulnerabilities that are identified as active threats: less than 4% of all CVEs are used in real-world attacks.
  • Prompts remediation for high-risk and high-impact KEVs to safeguard systems (e.g. those used in ransomware campaigns).
  • Creates a quick understanding of potential risks and impacts on the organization if the vulnerability is exploited.
  • Focuses efforts on reducing the window of opportunity for attackers to exploit vulnerabilities that pose significant risks.

Get Involved

We welcome your feedback and contributions to continue to advance the PKEV mapping project. There are several ways that you can get involved with this and other mapping projects to help advance threat-informed defense:

  • Review the mappings, use them, and tell us what you think. We welcome your review and feedback on the KEV/CVE mappings and resources.
  • Analyze and map CVEs of interest to you. We encourage use of our methodology to map additional KEVs/CVEs and we welcome feedback on our mapping methodology.
  • Share your ideas. Share your ideas or suggestions for additional tools and resources for helping the community to understand and make threat-informed decisions.

You are also welcome to submit issues for any technical questions/concerns or contact the Center directly for more general inquiries.

About the Center for Threat-Informed Defense

The Center is a non-profit, privately funded research and development organization operated by MITRE. The Center’s mission is to advance the state of the art and the state of the practice in threat-informed defense globally. Comprised of participant organizations from around the globe with highly sophisticated security teams, the Center builds on MITRE ATT&CK®, an important foundation for threat-informed defense used by security teams and vendors in their enterprise security operations. Because the Center operates for the public good, outputs of its research and development are available publicly and for the benefit of all.

© 2025 MITRE. Approved for Public Release. Document number CT0138.


About the Author

Tiffany Bergeron

As the Chief Mappings architect, Tiffany oversees all Center projects related to MITRE ATT&CK mappings, including the Mappings Explorer website, security platform mappings, and security control framework mappings.

More by Tiffany Bergeron

Recent Blog Posts:

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading

Stacked Defense from the Hardware Up

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading

Summiting the Pyramid: Bring the Pain with Robust and Accurate Detection

Summiting the Pyramid (STP) provides a methodology to score analytics against the pyramid of pain, helping defenders create more robust …

Continue reading