Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How ‘Vulnerability Chaining’ Turns Minor Security Threats Into Big Ones
Cybersecurity

How ‘Vulnerability Chaining’ Turns Minor Security Threats Into Big Ones

Chris HughesBy Chris HughesJanuary 10, 2022Updated:January 10, 20223 Mins Read
Facebook Twitter LinkedIn Email
Vulnerability Chaining
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

For anyone who has worked in or around cybersecurity, vulnerability management can feel like whack-a-mole—an endless game of chasing down vulnerabilities based on severity rating and prioritizing their remediation based on those ratings.

With the ongoing cybersecurity workforce shortage, security teams are often forced to focus on the most severe vulnerabilities, leaving low, moderate, and even sometimes high-ranked vulnerabilities to be addressed later. Too often, that means never.

Cybersecurity vulnerabilities are commonly ranked by severity, using open framework metrics such as the Common Vulnerability Scoring System (CVSS), which utilize various criteria to score vulnerabilities on a scale from zero to 10. For example, the recent Log4J was ranked 10.

Scoring systems such as CVSS help security teams prioritize their efforts. Where it becomes problematic is when teams only focus on the most severely ranked vulnerabilities, due to realities such as lack of time and resources or simply thinking lower-ranked vulnerabilities aren’t as significant. While this may seem intuitive, it is dangerous, due to the use of “vulnerability chaining.”

One Attack, Multiple Vulnerabilities

As defined by CVSS, vulnerability chaining is a situation where multiple vulnerabilities are exploited in the course of a single attack. CVSS even supports a method of scoring a chain of vulnerabilities, looking at their individual scores as well the exploitation of them in unison.

This could certainly happen with highly ranked vulnerabilities. But given the reality that defenders are largely prioritizing higher-ranked vulnerabilities, albeit with abysmal time frames (averaging 205 days), it is likely that chaining activities would have the highest success rate by targeting low hanging (pun intended) and long dwelling vulnerabilities, which tend to be neglected by cybersecurity professionals. Organizations such as the FBI, CISA, and security leader Tenable have published guidance laying out how advanced persistent threat (APT) state-sponsored groups have done these exact sort of chaining exploitation activities.

Another drawback of thinking of vulnerability severities in isolation is that it lacks context. The need for context in vulnerability management programs cannot be overstated. While a critically ranked vulnerability is a cause for concern, defenders need to be thinking about their broader enterprise architecture, mitigations, compensating controls, and the overall exploitability of a specific vulnerability. Blindly prioritizing vulnerabilities based on their severity scores alone fails to let organizations effectively address their most concerning findings, which truly may be the most exploitable and therefore post the greatest threat and risk to an organization.

As discussed above, the traditional approach to vulnerability management, which tends to focus on only addressing the most critical vulnerabilities, and often without any context of their actual exploitability, is woefully insufficient. Organizations must look to continue to mature their vulnerability management practices, something we will discuss in a subsequent article, leveraging emerging guidance from organizations such as NIST.

Raising Awareness

As malicious actors continue to mature their practices, especially when targeting specific organizations, defenders must do the same. Malicious actors are enumerating their findings when performing reconnaissance on target organizations, and are able to chain those findings together to maximize their impact and effectiveness.

Researchers such as Dr. Nikki Robinson have increasingly begun raising the conversation around vulnerability chaining, seeking to ensure organizations are aware of these threats and take the appropriate measures to address them. Organizations should strive to understand their vulnerability footprints, not in isolation but holistically and with context. You can be sure those looking to exploit them do.

Once organizations understand their vulnerability footprint they can begin to implement plans to address them based on driving down risk through practices such as enterprise patch management, which we will be discussing in an upcoming article, so stay tuned.

Cyber Security Cybersecurity channel Cybersecurity is an Enabler featured vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft Adopts A2A Protocol, Agentic AI Era Begins

May 9, 2025

AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

May 9, 2025

IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation

May 9, 2025

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration
  • IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.