SARA / Free Tools / EPSS Lookup

Free EPSS Score Lookup

Paste any CVE. Get the latest EPSS probability and percentile, plus a CISA KEV cross-check — updated daily from FIRST.org. No account, no sign-in.

CVE-2017-6740
High · 24.27%
EPSS Probability
24.27% (next 30 days)
Percentile
96.0th
CVSS Base Score
8.8
CISA KEV
YES — Actively Exploited
KEV Date Added
2022-03-03
Description
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic direct

ReferenceWhat is an EPSS score?

EPSS, the Exploit Prediction Scoring System, is a daily-updated probability that a CVE will be exploited in the wild within the next 30 days. Maintained by FIRST.org, it is the de-facto companion to CVSS for prioritizing vulnerability remediation in 2026.

Two numbers come back per CVE:

  • Probability — a value between 0 and 1. EPSS 0.95 means a 95% modeled chance the vulnerability will see exploit activity in the next 30 days.
  • Percentile — where this CVE ranks against every other CVE in the EPSS dataset. A percentile of 0.99 means the CVE is more likely to be exploited than 99% of all known CVEs.

CVSS tells you how bad a vulnerability could be in theory. EPSS tells you how likely it is to bite you in the next month.

GuideHow to use this tool

  1. Paste a CVE ID. We accept any well-formed CVE-YYYY-NNNNN.
  2. Click Lookup. We pull the latest score directly from the FIRST.org EPSS API — no caching, no staleness.
  3. Read the result. Probability, percentile, and whether the CVE is also on the CISA KEV catalog (a stronger signal than EPSS alone).
  4. Optionally, click Open in SARA to have SARA explain the underlying vulnerability, the affected products, and the recommended remediation in plain language.

When to useWhen should I use EPSS?

Prioritizing a patch backlog

Sort patch queues by EPSS percentile descending — work the top 1% first. EPSS will not eliminate the queue, but it will stop you patching the wrong things first.

Justifying out-of-cycle patches

EPSS spikes (e.g., 0.05 → 0.85 in a week) are strong evidence to leadership that a vulnerability has crossed from theoretical to active.

Tuning vuln-management SLAs

Many enterprises now pair CVSS thresholds with EPSS thresholds (e.g., CVSS ≥ 7 AND EPSS ≥ 0.7 → 7-day SLA).

Triaging an alert

If a SOC alert references a CVE, an EPSS percentile in the top 1% materially changes the urgency of escalation.

ComparisonEPSS vs CVSS — which should I use?

Both. CVSS measures impact assuming an exploit exists. EPSS measures how likely an exploit is to be deployed.

ScenarioCVSSEPSSVerdict
Dangerous on paper, unlikely in practice9.80.001Patch on schedule
Less severe but actively exploited6.50.95Patch tonight
Meaningful threat, contextual urgency7.50.20Use environment data

If you are still patching by CVSS alone in 2026, you are patching the wrong things first.

API

Want this in your SOAR or SIEM?

SARA Open ships an OpenAI-compatible API. Call POST /api/v1/analyze — SARA returns EPSS, CVSS, KEV status, and an analyst-grade written summary in one call.

curl -X POST https://sara-open.sirp.io/api/v1/analyze \
  -H "Authorization: Bearer $SARA_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"type": "cve", "value": "CVE-2021-44228"}'
Read the API reference →

FAQFrequently asked questions

What is a good EPSS score?
Anything at or above 0.5 means a vulnerability is more likely than not to be exploited in the next 30 days. Most enterprises treat 0.7 and above as a patch-immediately signal. Below 0.1, EPSS treats the vulnerability as low-likelihood — that is not the same as low-severity.
How often is EPSS updated?
Daily, by FIRST.org. This tool always pulls the most recent value with no caching.
Is EPSS free?
Yes. The EPSS dataset and API are free under FIRST.org's terms.
Can I bulk-lookup CVEs with EPSS?
This page handles single CVEs. Bulk lookups are available via the SARA API; Pro and Team plans support up to 200 and 500 requests per hour respectively.
Does EPSS replace CVSS?
No. EPSS measures likelihood. CVSS measures impact. Use both, plus the CISA KEV catalog as a binary signal of confirmed in-the-wild exploitation.
Is EPSS the same as the CISA KEV catalog?
No. EPSS is a probability model. KEV is a binary, evidence-based list of CVEs CISA has confirmed are being exploited. Use both — EPSS for forecasting, KEV for confirmed exploitation.

Browse related toolsKeep exploring

Looking for more?

Ask SARA — our AI security analyst — for full CVE context, exploit chains, and detection rules.

Try SARA