SMB Attack Probability Score
26/100medium
Weighted: EPSS · CISA KEV · SMB stack prevalence · exploit maturity · CVSS vector
CVSS v3
8.8
EPSS (30d)
0.23%
SMB Exposure
54.8/100
Attack Vector
NETWORK
Complexity
LOW
Privileges
LOW
Affected Products
vmg4005-b50bwx5610-b0ex5401-b1ex3510-b1emg5523-t50bvmg3927-t50k firmwarevmg8623-t50bemg3525-t50b firmwarevmg8825-t50k firmwarewx3401-b0 firmwarewx3401-b1vmg8623-t50b firmwaredx5401-b0px5301-t0 firmwareex3301-t0 firmwareex3500-t0ex5601-t0 firmwaredm4200-b0vmg4005-b50b firmwareax7501-b1ex5510-b0 firmwarevmg3625-t50b firmwareex3301-t0pm3100-t0 firmware
Remediation & References
What to do
🔥Apply firewall firmware update via vendor PSIRT advisoryhigh
Firewall vulnerabilities are high-value targets — they sit at the network perimeter. Download the patched firmware from the vendor's official PSIRT page. Schedule an off-hours maintenance window to avoid business disruption during the update.
⚙️Disable management interface access from the internetmedium
The firewall management portal (web UI, SSH, API) should never be exposed directly to the internet. Restrict management access to internal IPs or a dedicated management VLAN only.
NVD Full Entry ↗Official vulnerability detail, CVSS vectors, CPE listEPSS Score ↗Exploit Prediction Scoring System — FIRST.orgMitre CVE ↗MITRE CVE Program official entry
Vendor & Exploit References
Scoring Methodology
SMB Attack Probability Score weights: EPSS exploit likelihood (35%), CISA KEV active exploitation (25%), SMB stack prevalence (20%), exploit maturity (10%), CVSS network vector complexity (10%). Impact scenarios are derived from software category and historical SMB incident patterns. Scores recompute daily.