Vulnerability report details

Navigating a Vulnerability Report in Google Threat Intelligence: A Deep Dive

At Google Threat Intelligence, our mission is to provide security professionals with the timely, accurate, and contextualized intelligence they need to protect their organizations. A core component of our platform is the in-depth vulnerability report. These reports go beyond a simple CVE score, aggregating vast amounts of data into a single, actionable view.

To help you get the most out of our platform, this article will walk you through each section of a vulnerability report, using the report for CVE-2010-3765 as our guide.

Summary header

Components of the Vulnerability Summary include an Executive Summary, Severity, Associated Actors, a Vulnerability Timeline, Description, Analysis, CVSS scores, CISA Known Exploited Vulnerabilities, EPSS scores, CWE, Mitigation, Exploitation, and Workarounds.

Every vulnerability report begins with a high-level summary header, designed to give you the most critical information in seconds.

  • Vulnerability Identifier: The report is centered around a specific vulnerability, in this case, CVE-2010-3765. We also include the creation and last updated dates for the report itself.
  • Key Attributes Bar: This is your first stop for prioritization.
    • Risk Rating: Our internal assessment of the vulnerability's overall risk. High indicates a significant threat.
    • Exploit Availability: Shows if exploit code is available to attackers. Publicly Available means the barrier to entry for exploitation is low.
    • Exploitation State: Confirms whether we have evidence of this vulnerability being successfully exploited. Confirmed is a strong signal to take action.
    • Exploited As Zero Day: Indicates if the vulnerability was exploited before a patch was available.
    • Exploited in the Wild: The most critical indicator. Yes confirms active, real-world attacks are leveraging this vulnerability.
  • Actions: A set of tools to Follow, Share, Download IOCs, visualize relationships in the Graph, or Add your own IOCs.

The Main Tabs: A Section-by-Section Breakdown

The report is organized into logical tabs, allowing you to pivot based on your specific needs, whether you're a SOC analyst, threat hunter, or part of a vulnerability management team.

1. Summary Tab

Vulnerability Report Summary

This is the narrative and dashboard view of the vulnerability.

  • Summary & Analysis: A human-readable abstract written by our analysts. It explains what the vulnerability is, its potential impact (e.g., remote code execution), and the typical attack scenario.
  • Details: Key-value pairs of essential data points, including the original exploit release date, attack vectors (Email, Web), and mitigation advice (Patch).
  • Associated Reporting: This powerful section links the vulnerability to our long-form threat intelligence reports. Here, CVE-2010-3765 is directly linked to a report on the threat actor APT19, providing immediate context that this isn't just a vulnerability, but a tool used by a known adversary.
  • CVSS Score: We provide both the Base Score (9.3 Critical), representing the vulnerability's intrinsic severity, and the Temporal Score (6.9 Medium), which adjusts the score based on factors like the availability of a fix.
  • Vulnerable Products: A donut chart giving a quick overview of the most affected product families (e.g., Firefox, Fedora, Red Hat).

Some important definitions:

  • Priority: When using Google Threat Intelligence Group vulnerability intelligence data to prioritize remediation efforts for vulnerabilities we encourage users to consider three data points to effectively prioritize remediation efforts for vulnerabilities affecting them: Exploitation State, Exploit Availability, and Risk Rating (or Predicted Risk Rating). Our Priority Rating factors merge these three data points together to more clearly help customers understand the threat and potential impact each vulnerability poses, and therefore better prioritize remediations for those vulnerabilities. For our Priority scores, we utilize a traditional P0 through P4 model, with P0 being the highest criticality and P4 being the lowest:

    • P0:
      • All vulnerabilities with Risk Rating of "Critical".
      • Vulnerabilities with Risk Rating of "High" and Exploitation State of "Wide", "Confirmed", or "Reported".
      • Vulnerabilities with Risk Rating of "Medium" and Exploitation State of "Wide".
    • P1:
      • Vulnerabilities with Risk Rating of "High" and Exploitation State of "Suspected" or "No Known" and Exploit Availability not equal to "No Known".
      • Vulnerabilities with Risk Rating of "Medium" and Exploitation State of "Confirmed", Reported", or "Suspected".
      • Vulnerabilities with Risk Rating of "Low" and Exploitation State of "Wide" or "Confirmed".
    • P2:
      • Vulnerabilities with Risk Rating of "High", Exploitation State of "No Known", and Exploit Availability of "No Known".
      • Vulnerabilities with Risk Rating of "Medium", Exploitation State of "No Known", and Exploit Availability of "Trivial", "Publicly Available", "Privately Held", or "Unverified".
      • Vulnerabilities with Risk Rating of "Low" and Exploitation State of "Reported" or "Suspected".
    • P3:
      • Vulnerabilities with Risk Rating of "Medium", Exploitation State of "No Known", and Exploit Availability of "Interest Observed" or "No Known".
      • Vulnerabilities with Risk Rating of "Low", Exploitation State of "No Known", and Exploit Availability of "Trivial", "Publicly Available", "Privately Held", or "Unverified".
    • P4:
      • Vulnerabilities with Risk Rating of "Low", Exploitation State of "No Known", and Exploit Availability of "Interest Observed" or "No Known".
  • Exploitation availability: Indicates our knowledge of the current availability, interest, or development of code capable of exploiting a vulnerability.

    • No known: No exploit code is available. No claims of privately held exploits or proof-of-concepts (PoC). No walkthroughs exist with enough details to produce an exploit.
    • Interest Observed: No exploit code is available. No claims of privately held exploits or PoCs. Threat actors have been observed asking about or requesting exploits. Researchers have been observed attempting to write an exploit/PoC.
    • Unverified: An exploit sample is alleged to exist in the wild. However, Google TI has not evaluated this exploit to verify its legitimacy or functionality.
    • Privately Held: Credible reports of researchers possessing a PoC/exploit exist. Exploitation has been observed but the code for the exploit is not available.
    • Publicly Available: Exploit or PoC code exists and is (or was) available in the open.
    • Trivial: Exploitation of this vulnerability does not require specialized code.
  • CVSS Score:

    • CVSS v4 BT (Base and Threat): This metric group represents the intrinsic characteristics of a Vulnerability that are constant over time but not across user environments as well as the current state of exploit techniques or code availability for a vulnerability.
    • CVSS 3.1 Base Score: Filter based on a range of CVSS 3.1 Base Score metrics.
    • CVSS 3.1 Temporal Score: Filter based on a range of CVSS 3.1 Temporal Score metrics.
    • CVSS 2.0 Base Score: Filter based on a range of CVSS 2.0 Base Score metrics.
    • CVSS 2.0 Temporal Score: Filter based on a range of CVSS 2.0 Temporal Score metrics.
  • EPSS Score Range: Filter based on a range of EPSS Score metrics.

ℹ️

The Exploit Prediction Scoring System (EPSS) model is updated daily. When that data gets pushed to Google Threat Intelligence depends on a few factors:

  • If the vulnerability receives an EPSS score for the first time, the data is updated and immediately sent to Google Threat Intelligence.
  • If a new EPSS score is a significant change from the previous score (+/- 10%), the data is updated and immediately sent to Google Threat Intelligence.
  • Otherwise, on the next update to the vulnerability (new source/exploit added, updated analysis/description, new exploitation info, and so on), the most recent EPSS score is sent to Google Threat Intelligence.

2. IOCs (Indicators of Compromise) Tab

IOCs Sub-Tab

IOCs Tab

This tab is the home for all technical indicators associated with the vulnerability, crucial for threat hunting and detection. It is divided into sub-tabs for clarity.

Commonalities Sub-Tab

IOCs commonalities subtab

This is one of the most powerful views for threat hunting and campaign analysis. Instead of a simple list, the Commonalities tab aggregates all IOCs related to this CVE and identifies shared characteristics. It helps answer the question: "What other malicious behaviors, files, and infrastructure are connected to the exploitation of this vulnerability?"

Key sections that could be included, depending on the specific example:

  • Detections
    • Top threat category
    • Top threat name
    • Sandbox verdicts
    • Tags
  • Distribution Vectors
    • In The Wild URLs
    • Compressed Parents
    • PCAP Parents
  • Threat network infrastructure
    • Contacted Domains
    • Parent contacted Domains
    • Contacted IP Addresses
    • Embedded URLs
    • Embedded Domains
  • Similarity hashes
    • Feature hash (vhash)
    • Dynamic analysis feature hash (behash)
    • TLSH hash
    • Filecondis dhash
  • MITRE ATT&CK
  • Execution tracing
    • Mutexes created
    • Registry keys opened
    • Registry keys set
  • Static analysis
    • File Types

Telemetry Sub-Tab

IOCs telemetry subtab

Here, you can visualize real-world "lookups and submissions" related to the CVE, sourced from Google's global sensor network. The chart and map show temporal and geographic trends, helping you understand where the vulnerability is generating the most interest or activity.

Exploits Sub-Tab

IOCs exploit subtab

This view lists specific exploit files we have observed. For each file, you see:

  • File Hash (SHA256): A unique identifier for the exploit code.
  • Exploit Name: Often includes the file name and associated tags like metasploit or exploit, indicating its origin or purpose.
  • Exploit Grade: Our assessment of the exploit's reliability.
  • Size & Release Date: Additional metadata for identification.

3. Products and Fixes Tab

This tab is essential for vulnerability management and patching prioritization.

Vulnerable Products

  • Vulnerable Products: A comprehensive, searchable list of every affected vendor, product, and version. This allows you to precisely identify vulnerable assets in your environment.

Vulnerable Fixes

  • Vendor Fix Details: Direct links to official vendor advisories and patch information from sources like Red Hat, Debian, and Mozilla. This provides an authoritative path to remediation.

4. Sources Tab

Sources Tab

For transparency and further research, the Sources tab lists every source of information that contributed to our report. This includes NVD entries, security advisories, vendor bug trackers, news articles, and security research blogs.

5. History Tab

History Tab

Our reports are living documents. The History tab provides a complete changelog of every update made to the report by our systems and analysts. This shows you how our understanding of the threat has evolved, such as when it was first marked as "exploited in the wild" or when new YARA rules were added.

6. TTPs (MITRE ATT&CK) Tab

ttps tab

Understanding how a vulnerability is used is as important as knowing what it is. This tab maps the exploitation of the CVE to the MITRE ATT&CK® framework.

For CVE-2010-3765, we see it mapped to Tactics like Discovery and Command and Control, and specific Techniques like Application Layer Protocol (T1071). This helps defenders align their controls and detections with known adversary behaviors (TTPs).

7. Reporting Tab

Reporting Tab

This tab provides insight into the global activity and high-level reporting related to the vulnerability.

8. Community Tab

Community Tab

Security is a collaborative effort. The Community tab provides a space for verified users to share comments, ask questions, and contribute their own findings related to the vulnerability, fostering a shared understanding of the threat.