
This page provides more information on the various fields in Lansweeper Sites used to assess the exploitability of a vulnerability.
Exploitability refers to how easily an attacker can take advantage of a vulnerability. Understanding exploitability is crucial for developing effective mitigation plans based on vulnerability information.
For more information on vulnerability risk assessment in general, head over to Introduction to Vulnerability Risk Assessment.
Lansweeper provides information from several sources to evaluate the exploitability of each vulnerability. This results in an aggregated value, referred to as the exploitability. The easiest way to find the exploitability of a vulnerability is to navigate to Risk Insights > Active vulnerabilities, and selecting the vulnerability you'd like to inspect.
More detailed information is also available from each specific source, which we'll dive into.
You can track the exploitability of CVEs by adding exploitability columns to your custom views, or by accessing the new Exploitability section within a vulnerability.
Exploitability fields
Lansweeper provides information from four main sources: CISA, MSRC, NVD, and VulnCheck.

The values in the exploitability fields may appear as Unknown. This occurs when the data source used by Lansweeper has not yet provided information for that specific field.
CISA (Cybersecurity and Infrastructure Agency)
- Exploited in the wild: Indicates whether CISA has detected an exploit using this vulnerability.
- Action: Recommended actions users should take to mitigate the exploit.
- Due date: The deadline for applying a patch or mitigation.
- Ransomware: Information on whether the vulnerability has been used in ransomware campaigns.
MSRC (Microsoft Security Response Center)
- Exploitability: Indicates the likelihood of an exploit using this vulnerability, categorized as exploitation detected, more likely, less likely, or unlikely, based on Microsoft's observations.
NVD (National Vulnerability Database)
- Exploitability: A score indicating how difficult it is for an attacker to exploit the vulnerability, rated as low, medium, high, or critical.
- Impact: Provides details on the potential impact of the vulnerability on systems.
VulnCheck