Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Understanding Risk Level vs. Exploitability in CYRISMA

When reviewing vulnerability data in CYRISMA, two important indicators often raise questions: Risk Level and Exploitability. While both contribute to prioritizing remediation, they serve distinct purposes in evaluating exposure.

Written by Liam Downward

Updated at May 21st, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

📊 What is Risk Level? 🧨 What is Exploitability? 🎯 How to Prioritize 📉 Why Your Grade Might Not Be an A ✅ Final Thoughts

📊 What is Risk Level?

Risk Level refers to the severity of a vulnerability, often influenced by metrics such as CVSS scores, vendor assessments, and system impact. These are categorized as:

Critical

High

Medium

Low

A Critical or High risk level means the vulnerability could cause significant harm if exploited—but does not necessarily mean it’s being actively exploited in the wild.


🧨 What is Exploitability?

Exploitability describes how likely it is that a vulnerability can actually be exploited in the real world. This is based on active threat intelligence data, known exploit code availability, and how easily an attacker could take advantage of the flaw.

Low Exploitability: Difficult or rare to exploit

Medium: Some level of active exploitation observed

High: Widespread and actively exploited in the wild

🔍 Tip: A Critical vulnerability with Low Exploitability means it's dangerous in theory—but unlikely to be exploited today.


🎯 How to Prioritize

While the Risk Level helps you understand potential impact, the Exploitability rating helps you decide how urgent the remediation is.

Example Risk Level Exploitability Priority
Vulnerability A High High 🚨 Immediate action
Vulnerability B Critical Low ⚠️ Monitor and schedule patching
Vulnerability C Medium Medium 🔧 Patch in normal cycle

📉 Why Your Grade Might Not Be an A

Your CYRISMA grade is a dynamic metric that reflects:

  • The number of vulnerabilities found
  • The severity of those vulnerabilities
  • How many have been remediated
  • New threats discovered

Due to the constant evolution of threats and scanning cycles, maintaining an A grade is extremely rare. Instead, use the grade as a barometer—focus on:

  1. Ensuring all agents check in and scan regularly
  2. Prioritizing vulnerabilities with high exploitability
  3. Iterating scans after patching to improve visibility

✅ Final Thoughts

Don’t rely solely on the letter grade. Instead:

  • Regularly review scan history
  • Filter vulnerabilities by Risk Level + Exploitability
  • Tackle the most exploit-ready risks first

This balanced approach will help your team stay ahead of emerging threats without getting overwhelmed by less urgent noise.

risk assessment vulnerability assessment

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How Do We Grade Vulnerability Scans?
  • How To Create an Internal Unauthenticated Vulnerability Scan
  • Why Do My Vulnerability Scans Have a High Failure Rate?

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand