Our models are trained on over 16,000 known exploited CVEs
Compare Effort: CVSS, EPSS, Empirical Local
Empirical Models outperform CVSS as the way to prioritize vulns. When comparing performance measures (such as effort or coverage) it’s undeniable.
Published CVEs
Prioritized CVEs
Exploited CVEs
CVSS 9+ (Critical)
Threshold: 0.9
Effort: 14.4%
Coverage: 40.4%
Efficiency: 9.5%
EPSS V4 (Same Effort)
Better Coverage & Efficiency
Threshold: 0.029
Effort: 14.4%
Coverage: 87.6%
Efficiency: 20.6%
Empirical Local (Same Effort)
Better Coverage & Efficiency
Threshold: 0.028
Effort: 14.4%
Coverage: 95.4%
Efficiency: 22.4%
Local model results may vary depending on your security dataset.
Compare Coverage: CVSS, EPSS, Empirical Local
Empirical Models reduce the required effort to achieve the same coverage compared to CVSS. Empirical Global models are 6x more efficient.
Published CVEs
Prioritized CVEs
Exploited CVEs
CVSS 7+ (High to Critical)
Threshold: 0.7
Effort: 50.5%
Coverage: 76.8%
Efficiency: 5.1%
EPSS V4 (Same Coverage)
Less Effort, More Efficiency
Threshold: 0.098
Effort: 7.4%
Coverage: 76.8%
Efficiency: 34.8%
Empirical Local (Same Coverage)
Less Effort, More Efficiency
Threshold: 0.968
Effort: 2.6%
Coverage: 76.9%
Efficiency: 99.3%
Local model results may vary depending on your security dataset.
FAQ
What is EPSS?
While other industry standards have been useful for capturing innate characteristics of a vulnerability and provide measures of severity, they are limited in their ability to assess threat. EPSS fills that gap because it uses current threat information from CVE and real-world exploit data. The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
How do we define Efficiency?
Efficiency considers how efficiently resources were spent by measuring the percent of prioritized vulnerabilities that were exploited. Prioritizing mostly exploited vulnerabilities would be a high efficiency rating (resources were allocated efficiently), while prioritizing perhaps random or mostly non-exploited vulnerabilities would result in a low efficiency rating. Efficiency is calculated as the number of exploited vulnerabilities prioritized (True Positives, Correctly Identified) divided by the total number of prioritized vulnerabilities (True Positives + False Positives).
How do we define Coverage?
Coverage considers how well is the percent of exploited vulnerabilities that were prioritized, and is calculated as the number of exploited vulnerabilities prioritized (True Positives, Correctly Identified) divided by the total number of exploited vulnerabilities (True Positives + False Positives). Having low coverage indicates that not many of the exploited vulnerabilities were remediated with the given strategy.
Compare Model Threshold Performance
Empirical Models combine real-time internet exploitation telemetry with EPSS predictions to provide the most accurate view of exploitation. Empirical monitors activity on over 16,000 exploited CVEs—10 times more than the next best model—and offers hourly exploitation evidence and volume, an industry first. Compare to DHS CISA KEV: ~1200
CVSS
EPSS
Empirical Global
We bring measurable impact
Past solutions can’t prioritize, assess, and handle effective inference at scale. With Empirical, our models provide understanding and superior prioritization.
6x
More efficient than CVSS (comparison vs. EPSS, our free model, at 87% coverage)
12.4x
A 1249.04% increase in total exploited CVEs as of January 9th, 2025 compared to CISA Known Exploited Vulnerabilities (KEV)
23x
4925 newly exploited CVEs in the last 12 months, compared to 204 in CISA KEV