Skip to main content
availability

Package: Invicti AppSec Enterprise (on-premise, on-demand)

CISA KEV + EPSS Integration (Threat Intelligence)

Invicti AppSec integrates with two complementary public threat intelligence sources — CISA KEV and EPSS — under a single Threat Intelligence integration. This integration enriches every vulnerability in the platform with real-world exploitability data, helping security teams prioritize remediation based on whether a vulnerability is actively being exploited and how likely it is to be exploited in the near future.

  • CISA KEV (Known Exploited Vulnerabilities): A catalog maintained by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) listing CVEs that are confirmed to be actively exploited in the wild by threat actors. Inclusion in the KEV catalog is a strong signal that a vulnerability demands urgent attention.

  • EPSS (Exploit Prediction Scoring System): A data-driven model developed by FIRST.org that produces a daily probability score (0–1) estimating the likelihood that a CVE will be exploited in the wild within the next 30 days, along with a percentile ranking relative to all scored CVEs. Invicti uses these scores to calculate an EPSS Risk Rating.

  • No API key required. Both CISA KEV and EPSS are free, publicly available data sources. Activating this integration requires no credentials — only optional behavior configuration.

Overview

AttributeValue
Integration TypeThreat Intelligence
Auth MethodNone (public data sources, no API key required)
Data SourcesCISA KEV catalog + EPSS model (FIRST.org)
Data RefreshDaily (EPSS scores and KEV catalog are updated daily)
HostingCloud (public endpoints, no on-premises requirement)

Where It Is Used in Invicti AppSec

Page / FeaturePathPurpose
Threat Intelligence SettingsSettings → Integrations → Threat IntelligenceActivate and configure CISA KEV + EPSS behavior
Vulnerability Detail — Threat Intelligence TabProjects → [Project] → Vulnerabilities → [Vulnerability] → Threat Intelligence tabView enrichment data (EPSS score, risk rating, known exploit status) per vulnerability
Vulnerability ListProjects → [Project] → VulnerabilitiesEPSS risk rating and CISA KEV status can surface in vulnerability columns for sorting and filtering

1. Settings — Threat Intelligence

Path: Settings → Integrations → Threat Intelligence

This is where a team admin activates the CISA KEV + EPSS integration. The configuration modal lets you control whether Invicti should automatically adjust vulnerability severity levels based on EPSS risk ratings. Once activated, the integration runs in the background, enriching all vulnerabilities with daily-updated threat data.

2. Vulnerability Detail Page — Threat Intelligence Tab

Path: Projects → [Project] → Vulnerabilities → [Vulnerability detail] → Threat Intelligence tab

After the integration is active, a Threat Intelligence tab appears on every vulnerability detail page. This tab consolidates all threat enrichment data for the specific CVE associated with the vulnerability.

What the tab shows (EPSS data):

FieldDescription
EPSSThe exploit probability score and percentile. Displayed as X.XX th percentile Y%, where the percentile measures the vulnerability's EPSS probability relative to all known CVE scores. A tooltip links to the FIRST.org EPSS documentation.
Risk RatingInvicti's calculated risk level based on EPSS probability and percentile, shown color-coded by severity (Critical, High, Medium, Low, Info).
Known ExploitYes/No — whether a working exploit is publicly known for this CVE.
AnalysisHuman-readable threat analysis for the CVE, if available.
Was Zero DayWhether this CVE was ever a zero-day vulnerability.
Last Checked OnThe date when the threat intelligence data was last refreshed.

What the tab shows (CISA KEV data, when available):

FieldDescription
Observed in the WildYes/No — whether exploitation of this CVE has been observed in real attacks (from the CISA KEV catalog).
DescriptionCVE description from the threat intelligence source.
Executive SummaryHigh-level summary of the threat.
Exploitation ConsequenceWhat an attacker can achieve by exploiting this vulnerability.
Exploitation StateCurrent state of exploitation activity.
Exploitation VectorsList of attack vectors used to exploit this CVE.
Available MitigationsKnown mitigations or workarounds for this CVE.

How the data helps prioritize work:

A vulnerability with a high EPSS percentile (e.g., 97th percentile) and a CISA KEV listing means it is both statistically likely to be exploited and already confirmed as actively exploited — making it the highest-priority finding regardless of its CVSS severity score. The Threat Intelligence tab puts this context directly on the vulnerability detail page where developers and security engineers can see it when triaging findings.

Prerequisites

RequirementDescription
No credentials neededCISA KEV and EPSS are public data sources. No API key, token, or account is required.
Network AccessInvicti AppSec must be able to reach the CISA KEV and EPSS public APIs over HTTPS to sync daily updates.
Team Admin roleOnly users with the Team Admin role (role 5) can activate integrations in Settings.

Step 1: Navigate to Threat Intelligence Integrations

From the left sidebar, go to Settings → Integrations.

On the Integrations page, select the Threat Intelligence tab to view available threat intelligence providers.

Step 2: Find the CISA KEV + EPSS Card

Locate the CISA Kev + EPSS card in the Threat Intelligence integrations list.

Click the Activate button on the card to open the configuration modal.

Step 3: Configure the Activation Modal

The CISA KEV + EPSS configuration modal opens in the center of the screen.

CISA KEV + EPSS activation modal

The modal displays the following notice:

If the toggle below is not enabled, the EPSS probability, percentile and the associated risk rating will be displayed on the interface without having an impact on the severity of vulnerabilities.

This means the integration is always useful even without enabling severity adjustment — you get the full EPSS enrichment data in the Threat Intelligence tab regardless. The toggle only controls whether EPSS data is also used to override scanner-reported severity levels.

It includes the following configuration options:

Severity Adjustment (Optional)

SettingDescription
Let Invicti change severity of vulnerabilities to match EPSS risk ratingWhen enabled, Invicti will override the scanner-reported severity of vulnerabilities to match the EPSS-derived risk rating calculated by the platform. This is an irreversible action — severities will not be automatically reverted if this setting is later disabled.
Only upgrade severity to match EPSS(Shown when severity adjustment is enabled) Invicti will only raise the severity of a vulnerability if the EPSS risk rating is higher than the scanner-reported severity. It will never lower it.
Only downgrade severity to match EPSS(Shown when severity adjustment is enabled) Invicti will only lower the severity of a vulnerability if the EPSS risk rating is lower than the scanner-reported severity. It will never raise it. Note: the "Only upgrade" and "Only downgrade" toggles are mutually exclusive.
warning

Enabling severity adjustment is an irreversible behavioral change. Once severities are changed to match EPSS, they will not be automatically restored if the integration is deactivated. Review the impact carefully before enabling this option.

Insecure (Optional)

SettingDescription
InsecureDisables SSL/TLS certificate verification when fetching threat intelligence data. Enable only if your network environment uses self-signed or untrusted certificates and you accept the associated risk. Not recommended for production environments.

Step 4: Activate the Integration

Click Activate to save the configuration and enable the CISA KEV + EPSS integration.

If severity adjustment is enabled, a confirmation dialog appears warning that vulnerability severities will be changed and cannot be automatically reverted. Click Yes to confirm.

After activation, the CISA Kev + EPSS card displays a green active badge, confirming the integration is running.

CISA KEV + EPSS active state

Summary

StepAction
1Navigate to Settings → Integrations → Threat Intelligence
2Locate the CISA Kev + EPSS card and click Activate
3(Optional) Enable severity adjustment and configure upgrade/downgrade behavior
4(Optional) Enable the Insecure option if required by your network
5Click Activate (and confirm if severity adjustment is enabled)
6Verify the green active badge appears on the card

How EPSS Risk Rating Is Calculated

Invicti calculates the EPSS Risk Rating from the raw EPSS probability and percentile values using the following scale:

Risk RatingCriteria
CriticalVery high EPSS probability (top percentile range)
HighHigh EPSS probability
MediumModerate EPSS probability
LowLow EPSS probability
InfoNegligible EPSS probability

For the precise calculation methodology, refer to the Invicti EPSS documentation.

Troubleshooting

ProblemPossible CauseSolution
Threat Intelligence tab not appearing on vulnerability detailThe integration is not yet activeVerify the CISA Kev + EPSS card shows a green active badge on the Threat Intelligence settings page
EPSS data showing as "No data available"The CVE associated with the vulnerability has not been scored by EPSSNot all CVEs receive EPSS scores. Only CVEs in the National Vulnerability Database (NVD) with enough public data are scored.
Risk Rating not matching expectationsEPSS scores are updated dailyAllow up to 24 hours after activation for threat data to be fully populated across all vulnerabilities
Severity not changing after enabling severity adjustmentThe EPSS risk rating may already match the current severitySeverity adjustment only changes severities when the EPSS risk rating differs from the scanner-reported value
Network connectivity error during activationInvicti cannot reach the CISA KEV or EPSS public APIsVerify that outbound HTTPS traffic from Invicti AppSec is not blocked by firewalls or proxy rules

Best Practices

  1. Enable EPSS enrichment without severity adjustment first: Activate the integration initially without enabling severity adjustment. This lets your team review EPSS data in the Threat Intelligence tab and understand the risk ratings before committing to automated severity changes.

  2. Use "Only upgrade" for conservative severity management: If you decide to enable severity adjustment, "Only upgrade" is the safer option — it can raise the priority of underrated vulnerabilities without ever reducing the severity of findings your scanner flagged as high.

  3. Cross-reference CISA KEV status with your asset inventory: A vulnerability in the CISA KEV catalog affecting an internet-facing asset should be treated as a critical priority regardless of CVSS or EPSS scores. Use the Threat Intelligence tab to identify these cases quickly.

  4. Combine with SLA policies: Use the EPSS risk rating as an additional input for SLA configuration in Invicti AppSec. Vulnerabilities with a high EPSS percentile can be assigned tighter SLA deadlines.

Limitations

  1. CVE-only enrichment: EPSS and CISA KEV data only exists for CVEs (Common Vulnerabilities and Exposures). Vulnerabilities without a CVE identifier (e.g., custom application vulnerabilities) will not have threat intelligence data and the Threat Intelligence tab will show an empty state.

  2. Daily data updates: EPSS scores and the CISA KEV catalog are updated once per day. There is an inherent delay between when a new exploit is discovered and when the data appears in Invicti AppSec.

  3. Irreversible severity changes: If severity adjustment is enabled and then disabled, vulnerability severities already changed by EPSS will not be reverted. Manual review is required to restore original severities.

  4. No on-premises data source: This integration relies on publicly accessible CISA and FIRST.org APIs. Fully air-gapped environments cannot use it unless a network path to these public endpoints is available.


Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?