The Future of VRM: Partnering with CVE Issuers
Small additions at CVE creation time can dramatically improve downstream risk modeling accuracy in VRM 3.x. By adding standardized exploitability hints, CNAs can help every consumer differentiate real-world risk per asset type.
How these tags feed into VRM 3.0 and 3.x
VRM uses these tags as context-aware modifiers to reflect how assets are actually attacked.
Workstations
- Elevate #LocalApplication (users browse, click, open files).
- Reduce #RemoteService (endpoints should have few/no exposed services, host firewalls isolate inbound traffic).
- #PhysicalAccess depends on environment (office vs public kiosk).
Servers
- Elevate #RemoteService (core attack surface for business-critical services).
- Reduce #LocalApplication (servers don’t run browsers or productivity apps).
- #PhysicalAccess typically low risk unless the device is field-deployed.
Specialized devices (kiosks, medical devices, POS, OT/IoT)
- Elevate #PhysicalAccess due to public/field exposure.
- Balance #LocalApplication and #RemoteService based on architecture.
Human-friendly examples:
- A Chrome RCE (#LocalApplication) is high-risk on employee laptops but almost irrelevant on a hardened backend server.
- An unauthenticated RCE in a web server (#RemoteService) is critical for servers but meaningless on a workstation that doesn’t run such a service.
- A USB-based takeover (#PhysicalAccess) is negligible on locked racks in a datacenter but severe on a public kiosk or patient-facing medical device.
What CVE issuers can do today
CNAs can help create a consistent global language for exploitability classification with a few small steps.
- Add #LocalApplication, #RemoteService, and #PhysicalAccess tags when publishing CVEs.
- Apply multiple tags if the vulnerability can be used in different contexts (for example, a library used in browsers and servers).
- Add tag rationale to the CVE metadata or description.
- Encourage reproducible, standardized tagging across vendors.
- Help create a consistent global language for exploitability classification.
- Note: This is not a competing scoring system — it’s a tiny metadata addition with outsized impact.
Roadmap for VRM 3.x
VRM continues to evolve as we partner with CNAs, vendors, and researchers.
Where we are
- VRM 3.0 = CVSS × EPSS × Context.
- VRM 3.1 = richer lifecycle/business modifiers.
- VRM 3.2 = vulnerability aging, habits, attack-surface pressure.
Where we are going
- VRM 3.x = exploitability tag integration for per-asset-type risk scoring.
- Collaborating with CNAs to standardize tags and rationale.
- Inviting vendors and researchers to pressure-test and refine the approach.
Together we can make risk modeling clearer, faster, and more aligned to how vulnerabilities are actually exploited.
Join us in shaping VRM 3.x
CVE issuers and vendors: collaborate on exploitability tagging so every CVE ships with a consistent signal. Security leaders: subscribe for VRM 3.x updates or contact us directly.