ExPRT.AI如何预测下一个将被利用的漏洞

news/2025/10/23 21:33:42/文章来源:https://www.cnblogs.com/qife122/p/19161694

How ExPRT.AI Predicts the Next Exploited Vulnerability | CrowdStrike

overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falcon®️ Exposure Management, is built to help teams prioritize which vulnerabilities are most urgent for them.

Without real-world adversary telemetry, most vulnerability management tools are disconnected from attacker behavior. Their backward-looking threat feeds only assess risk after adversaries act. With shallow automation, their triage still depends on manual rules, tagging, and guesswork.

All the while, adversaries are getting faster: The eCrime breakout time has dropped to a low of 51 seconds, the CrowdStrike 2025 Threat Hunting Report found. SCATTERED SPIDER has accelerated from account takeover to ransomware in just 24 hours.

ExPRT.AI does more than score vulnerabilities. It predicts which will be exploited, using live adversary signals, observed attack behavior, and AI trained on CrowdStrike's proprietary threat intelligence. With ExPRT.AI, security can act faster to fix the vulnerabilities most critical to their environment.

How ExPRT.AI Knows What Attackers Will Exploit

ExPRT.AI takes a fundamentally different approach than traditional scanning tools that still rely on static severity ratings, statistical projections, and legacy scanning infrastructure. It uses AI trained on years of threat intelligence from CrowdStrike Counter Adversary Operations, combined with observed exploit behavior and global telemetry across endpoints, cloud workloads, and identities. The result is a dynamic, transparent, and forward-looking exploitability score that indicates what attackers are most likely to target next.

While CVSS score is an important factor, the decision to prioritize a patch should not be based on this score alone. In fact, attackers sometimes favor lower-severity vulnerabilities, in particular when chaining vulnerabilities — a method that allows adversaries to achieve remote code execution (RCE) by combining multiple exploits into a single attack.

As explained in the CrowdStrike 2025 Global Threat Report, exploit chaining undermines the severity score-based patching process that many businesses follow. While pre-authentication vulnerabilities receive out-of-band patches and are typically prioritized for patching, associated post-authentication exploits receive less attention and may be ignored. This could potentially allow the exploit to be chained with a different vulnerability later on to again achieve RCE.

Unless an organization addresses the root cause of multiple vulnerabilities, threat actors can repurpose similar techniques and quickly develop alternatives that bypass initial mitigations. Given this, it's essential to understand the context of vulnerabilities when prioritizing patching.

ExPRT.AI evaluates vulnerabilities in the context of real attacker tradecraft. And it gets smarter every day.

The Mechanics of Prediction: Inside the ExPRT.AI Model

ExPRT.AI is trained to rank vulnerabilities based on how likely they are to be exploited in the real world. Powered by years of CrowdStrike's proprietary threat intelligence, adversary tradecraft, and real-time telemetry, the model doesn't ask, "How bad is this vulnerability in theory?" It asks, "Would an attacker actually use this?"

To answer this, ExPRT.AI evaluates a blend of behavioral and environmental factors, including:

  • How broadly the affected software is deployed across global environments
  • Whether exploitation techniques are public or already weaponized
  • How easy it is to execute (e.g., no user interaction, remote code execution)
  • Whether it enables adversary objectives like persistence, lateral movement, or privilege escalation

With this information, it shares the real-world exploitability of each vulnerability so teams can focus on what's likely to be used against them.

How the Exploitability Score Is Created

Each vulnerability is evaluated using a curated set of adversary-aligned signals. These inputs are indicators of attacker interest, intent, and opportunity, and they're mapped directly to outcomes that matter for defenders.

The signals listed below are some of the most impactful and predictive, based on what we consistently observe in real-world exploit activity. They represent a subset of the broader set of inputs ExPRT.AI uses to assess exploitability.

  • Exploit activity: CrowdStrike tracks vulnerability exploitation in the wild. If attackers are already using a vulnerability, ExPRT.AI prioritizes it.
  • Adversary tooling reuse: ExPRT.AI identifies vulnerabilities included in malware kits, offensive security tools, and active campaign infrastructure. This helps security teams detect and patch flaws that are already operationalized in attacker workflows.
  • Software prevalence: The broader the deployment of the affected software, the more attractive the vulnerability becomes to adversaries seeking scale. By factoring in prevalence, ExPRT.AI helps teams prioritize vulnerabilities that attackers are more likely to target across environments.
  • Patch availability: ExPRT.AI evaluates whether a patch exists and how widely it's been adopted. This helps defenders focus on exposures that are still viable attack vectors.
  • Attack vectors: While ExPRT.AI moves beyond CVSS, it still incorporates key vectors like attack complexity, required privileges, and user interaction. This ensures the exploitability score reflects the true exploit potential of a vulnerability.
  • CrowdStrike Threat Graph®️: Every score is enriched with real-time global telemetry and adversary intelligence from CrowdStrike Threat Graph. This gives ExPRT.AI visibility into attacker activity across endpoints, identities, cloud workloads, and more.

Together, these signals produce a daily updated, globally consistent exploitability score. But ExPRT.AI doesn't stop at a number — it also provides a transparent explanation of the top weighted factors that drove the result. This gives analysts confidence to act, and leadership visibility into why certain vulnerabilities take priority.

Powered by the AI-Native Falcon Platform

ExPRT.AI is natively embedded in Falcon Exposure Management and delivered from the CrowdStrike Falcon®️ platform, CrowdStrike's AI-native foundation that connects endpoint, identity, cloud, and threat intelligence in real time. It's powered by the same AI and telemetry that drive detection, investigation, and automated response across the platform.

The capabilities of the Falcon platform empower ExPRT.AI users to:

  • Know what to fix first: When ExPRT.AI is paired with Falcon's AI-driven asset criticality, teams see what's likely to be exploited and why it matters to the business. Falcon Exposure Management surfaces vulnerabilities that intersect exploitability and business impact, using live Falcon platform data.
  • Accelerate triage and incident response: Because ExPRT.AI is part of the Falcon platform, exploitability context appears immediately in detections and SOC workflows alongside endpoint, identity, and threat intelligence data. Analysts get the full picture from the start without the need to dig for data or rely on extra tools.
  • Simplify remediation: ExPRT.AI exploitability scores and context flow directly into Falcon platform dashboards, CrowdStrike Falcon®️ Next-Gen SIEM, ticketing systems, and CrowdStrike Falcon®️ Fusion SOAR playbooks so teams don't need to jump between tools or reprioritize manually. Everything stays in sync across teams and workflows because it's all built on the same platform.
  • Gain real-time threat context: Because ExPRT.AI is continuously updated with live data from CrowdStrike Threat Graph, every prioritization decision reflects what attackers are doing at that moment. This global telemetry comes from millions of sensors and adversary-tracked operations.

This is what vulnerability prioritization looks like on an AI-native platform: built-in intelligence, real-time context, and operational value on Day One.

Customer Impact: From Noise to Precision

Organizations using ExPRT.AI are seeing measurable, repeatable outcomes across risk reduction, remediation speed, and operational efficiency. Intermex, for example, achieved a 98% reduction in critical vulnerabilities in its DMZ by combining ExPRT.AI with AI-driven asset criticality, streamlining its entire patching workflow.²

Across CrowdStrike customers, ExPRT.AI has shown to³:

  • Focus precision: ExPRT.AI helps teams focus 95% of their remediation effort on just 5% of vulnerabilities most likely to be exploited.
  • Drive consolidation: Organizations can save up to $300K by consolidating legacy scanning tools and siloed risk platforms into Falcon Exposure Management.
  • Boost operational efficiency: FEM customers reclaim up to 2,000 hours per year by eliminating manual triage, redundant patching, and false positives.
  • Reduce incidents: Customers report up to a 50% reduction in incidents requiring vulnerability analysis, thanks to AI-driven exploit prediction.

Smarter, Informed Patching

We continue to innovate in vulnerability management. At Fal.Con 2025, we debuted the Exposure Prioritization Agent, one of several new AI agents built to fortify the agentic SOC. The Exposure Prioritization Agent summarizes vulnerabilities in plain language, validates their exploitability with Falcon platform telemetry, maps their impact to business-critical assets, and delivers a prioritized, high-confidence list of what to fix first.

Risk-based Patching, coming soon to CrowdStrike Falcon®️ for IT, aims to close the gap between security and IT teams. Falcon Exposure Management relies on adversary activity and attack paths to prioritize vulnerabilities, and Risk-based Patching acts on this information by using AI-powered patching with Patch Safety Scores and sensor intelligence to remediate risk.

As CrowdStrike leads the next era of cybersecurity with the agentic security platform, Falcon Exposure Management will deliver real-time, risk-based prioritization powered by the same intelligence behind CrowdStrike®️ Charlotte AI:trade_mark: and agentic SOC automation.

Additional Resources

  • Download this guide to take the first step toward a smarter, faster, and more resilient approach to managing your organization's exposure: Beyond the Scan: An Ultimate Buyer's Guide to Modern Exposure Management.
  • Learn more about how Falcon Exposure Management can help you discover and manage vulnerabilities and other exposures in your environments.
  • To learn more about Falcon Exposure Management features, visit our Tech Hub.

¹. https://nvd.nist.gov/vuln/search#/nvd/home?resultType=statistics
². https://www.crowdstrike.com/en-us/resources/customer-stories/intermex/
³. These numbers are projected estimates of average benefits based on recorded metrics provided by customers during pre-sale motions that compare the value of CrowdStrike with the customer's incumbent solution. Actual realized value will depend on individual customer's module deployment and environment.
更多精彩内容 请关注我的个人公众号 公众号(办公AI智能小助手)
对网络安全、黑客技术感兴趣的朋友可以关注我的安全公众号(网络安全技术点滴分享)

公众号二维码

公众号二维码

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/944695.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

求函数

求函数 题目描述 牛可乐有 $n$ 个一次函数,第 $i$ 个函数为 $f_i(x) = k_i \times x + b_i$。 牛可乐有 $m$ 次操作,每次操作为以下二者其一:$1$ $i$ $k$ $b$ 将 $f_i(x)$ 修改为 $f_i(x) = k \times x + b$。 $2$ …

AI元人文构想的跨学科研究:技术实现与人文影响分析——对自由与责任的再框架化(DeepSeek基于Ai元人文系列文章研究)

AI元人文构想的跨学科研究:技术实现与人文影响分析——对自由与责任的再框架化 ——DeepSeek基于Ai元人文系列文章研究引言:AI元人文构想的理论基础与概念界定1.1 概念起源与核心内涵 “AI元人文”构想由学者岐金兰提…

Python---简易编程解决工作问题

近期在做一些很简单但是很繁琐的工作,就考虑使用Python来进行开发一些工具。 首先是下载安装Pythonhttps://www.python.org/downloads/release/python-3140/检查是否安装成功:python --version检测pip是否正常:pip …

DM8 安装包 for linux_x86

下载地址 https://8ma.co/res/VWXE40M2 ◀ ◀ ◀.zstitle { width: 280px; text-align: center; font-size: 26px } .zsimgweixin { width: 280px } .zsimgali { width: 280px; padding: 0px 0px 50px 0px } .zslef…

日总结 16

Git 是一款分布式版本控制系统,核心作用是追踪文件(尤其代码)的修改历史、管理多版本,并支持多人高效协作。它通过记录每一次修改(可随时回退到任意历史版本)、分支功能(实现并行开发不冲突)、分布式特性(本地…

MPK(Mirage Persistent Kernel)源码笔记(1)--- 基础原理

MPK(Mirage Persistent Kernel)源码笔记(1)--- 基础原理 目录MPK(Mirage Persistent Kernel)源码笔记(1)--- 基础原理0x00 概要0.1 传统LLM推理框架的瓶颈0.2 MPK的流程重构0.3 MPK的关键优势0x01 问题1.1 现有…

背包dp(1)

背包dp(1)Posted on 2025-10-23 21:24 tttfred 阅读(0) 评论(0) 收藏 举报做到了一个题,发现对背包问题理解有点浅,应该说是忘了 Dutch Democracy 给你一个数集,你要找到出满足以下两个条件的子集的个数 1.和…

模拟can通信

实验一 模拟can通信 1、虚拟CAN接口创建 实车上算法一般通过ros进行通信,车辆和控制器之间则通过can通信实现。 can信号的发送和接收一般是需要载体的,我们一般都有can0和can1设备可以使用,在电脑上创建这个设备: …

202501软件工程第二次团队作业

202501软件工程第二次团队作业智能天气出行助手 —— 基于MCP协议的自然语言交互系统这个作业属于哪个课程 https://edu.cnblogs.com/campus/fzu/202501SoftwareEngineering这个作业要求在哪里 https://edu.cnblogs.co…

题解:P14174 【MX-X23-T4】卡常数

题目传送门 超级水题 , 谁都可以拿的经验 考察贪心 + 堆(最简单的用优先队列实现)题面 给定 $ n$ 个数组和每个数组的常数 \(x\) 和长度 \(l\) , 给定每个数组的 $a_i $ 、 \(b_i\) , 定义是可以实施 \(k\) 次把某个…

比赛题解 总结

1.[HNOI2003] 操作系统 思路 此题是一道大模拟,主要根据任务优先级来计算最后执行此任务的时间,此时我们可以进行分类讨论:当此任务的到达时间大于等于上一个未执行完任务的结束时间,上一个任务就一定能运行完,因…

解题报告-拯救计划(概率 DP)

拯救计划 题目背景 有一天,地球护卫队的 P 队长得知,邪恶的 Y 星球要向地球发起侵略。正义感责任感极强的小 P 怎么可能允许这类事情发生。为了小 W,同时也为了保卫地球,小 P 准备动员所有力量殊死一战,正当小 P …

解码Linux文件IO之库的制作与应用

程序编译的四个核心阶段 程序从源代码(.c/.cpp)到可执行文件,需经过预处理、编译、汇编、链接四个步骤,每个步骤生成不同中间文件,最终输出可执行程序。预处理作用:展开预处理指令(#include/#define/#if等)、删…

20251023 正睿二十连测

B 时间:看了题解后花了 \(30\) 多分钟吧。给定 \(n\) 对数 \((a_i, b_i)\) 以及 \(T\) 组询问,每组询问给定 \((x, y)\),问有多少对给定的数能通过对 \((x, y)\) 进行若干次以下两种操作得到?\((x, y) \leftarrow …

1019:浮点数向零舍入(分正负取整)

【题目描述】 输入一个单精度浮点数,将其向零舍入到整数。说明:向零舍入的含义是,正数向下舍入,负数向上舍入。提示:可以使用强制类型转换来实现。 【输入】 一个单精度浮点数。 【输出】 一个整数,即向零舍入到…

创建 SQL Server 数据库【通用】

use master go-- 如果存在这个数据库名称 ,否则删除 if exists(select * from sysdatabases where name = MyFirstDB) drop database MyFirstDB-- 创建数据库 create database MyFirstDB on primary (name=MyFirstDB_…

HNSW算法实战:用分层图索引替换k-NN暴力搜索

向量检索是整个RAG管道的一个重要的步骤,传统的暴力最近邻搜索因为计算成本太高,扩展性差等无法应对大规模的搜索。 HNSW(Hierarchical Navigable Small World,分层可导航小世界图)提供了一种对数时间复杂度的近似…

日志分析-IIS日志分析

日志分析-IIS日志分析 1.phpstudy-2018站点日志.(.log文件)所在路径,提供绝对路径 按照下列步骤找到 flag{C:\inetpub\logs\LogFiles\W3SVC2}2.系统web日志中状态码为200请求的数量是多少 将日志爬下来传到linux中 在…

Spring Boot 自动配置之 TaskExecutor - 实践

Spring Boot 自动配置之 TaskExecutor - 实践2025-10-23 21:05 tlnshuju 阅读(0) 评论(0) 收藏 举报pre { white-space: pre !important; word-wrap: normal !important; overflow-x: auto !important; display: b…

二分图/忆re.

rt: 本文分两部分二分图 忆re.part 1 二分图 定义 我会告诉你我OIwiki没看懂吗? 其实就是有一张图,将它的点分为红点和蓝点,红点只能和蓝点相连,同理蓝点只能和红点相连,满足这个条件的图就是二分图。 形式上的…