Exploitability in Mend SCA
Overview
This feature enhances the security of your software, exposing known public exploits in detected open-source vulnerabilities within the Mend AppSec Platform. By proactively identifying and highlighting vulnerabilities that have public exploits, we empower users to take immediate action and prioritize the necessary remediation efforts.
Further reading that will help you get acquainted with public exploits.
Getting it done
Prerequisites before getting started with Exploitability
UI - Access to the Mend AppSec Platform is required
API 3.0 - Permissions to execute the following API call:
Get Project Security Findings (Dependencies - SCA)
Viewing Exploitability Statuses in the Mend AppSec Platform
A known exploit will be displayed only when the Exploit Code Maturity is "Proof of Concept" or higher ("Proof of concept” / "Functional" / "High").
The exploitability information will be presented in the Dependencies section of your application or project. It’s available under the Risk Factors column in various tables, e.g., Direct Libraries, Findings etc.
Step 1 - Navigate to the Dependencies screen of your desired application/project.

Step 2 - Click the exploitable CVE, its Severity or its Risk Factors will take you to the CVE Details window.

Step 3 - At the top, you can see all the Risk Factors impacting the CVE.
The exploitability information will be displayed under the Threat Assessment section:

Exploitability Information
The Threat Assessment is section will display the following parameters:
Exploit Maturity
Available statuses are Not defined, Unproven, Proof of concept, Functional and High.Proof-of-concept- exploit code is accessible, or a practical attack demonstration is challenging for many systems. The code or technique may not be functional in all scenarios and could demand significant alteration by a skilled attacker.
Functional- The code works in most situations where the vulnerability exists.
High- Functional autonomous code exists, or no manual exploit is needed (automatic activation), and information is widely accessible. Code functions universally, or it's being spread by self-operating agents like worms or viruses. Network-linked systems will probably face scanning or attacks. Exploit creation is advanced with dependable, widely available, user-friendly automation tools.
EPSS (%)
EPSS predicts the likelihood of a vulnerability being exploited in the wild. It provides a score between 0 and 1, where higher scores indicate a greater probability of active exploitation. However, it does not guarantee exploitation; it simply means that, based on the data and models used to generate the score, there is a higher probability that attackers might target this vulnerability.
Exploitability in the Mend API
2 parameters, exploitCodeMaturity and epssPercentage, have been added to the Get Project Security Findings (Dependencies - SCA). They will appear under the threatAssessment section of the response:

More information about these API calls is available in the Mend API.
Exploitability in the Repo Integrations
The exploitability data can also be toggled on in the repo integration, by adding "exploitability": true
to the scanSettings section of the .whitesource config file
If
scanSettings.exploitability
is set totrue
and the vulnerability has exploitability data → this will be reflected in the issues and security checkIf
scanSettings.exploitability
is set totrue
and the vulnerability has no exploitability data → no threat assessment information will be displayed for the vulnerability in the table and the “Threat Assessment” section shouldn’t be in the details


Example:
{
"scanSettings": {
"configMode": "AUTO",
"enableLicenseViolations": true,
"baseBranches": [],
"exploitability": true
},