SMB Attack Probability Score
16/100low
Weighted: EPSS · CISA KEV · SMB stack prevalence · exploit maturity · CVSS vector
CVSS v3
8.8
EPSS (30d)
0.12%
SMB Exposure
10/100
Attack Vector
NETWORK
Complexity
LOW
Privileges
NONE
Remediation & References
What to do
🌐Network-accessible service — review firewall exposuremedium
The affected service is reachable over the network. Verify that it is not exposed to the internet unnecessarily. Apply network segmentation to limit blast radius if exploited.
🎣Raise user awareness — this can be triggered via phishingmedium
Exploitation requires user interaction (e.g., opening a file, clicking a link). While patching is the definitive fix, remind users not to open unexpected attachments or links. This type of vulnerability is commonly chained with phishing campaigns targeting SMBs.
NVD Full Entry ↗Official vulnerability detail, CVSS vectors, CPE listEPSS Score ↗Exploit Prediction Scoring System — FIRST.orgMitre CVE ↗MITRE CVE Program official entry
Vendor & Exploit References
Scoring Methodology
SMB Attack Probability Score weights: EPSS exploit likelihood (35%), CISA KEV active exploitation (25%), SMB stack prevalence (20%), exploit maturity (10%), CVSS network vector complexity (10%). Impact scenarios are derived from software category and historical SMB incident patterns. Scores recompute daily.