Back to Blog

From 145 Vulnerabilities to 1 Critical Priority

Why Vulnerability Scanners Aren't Enough to Fix Your Container Security

Ali Yazdani
From 145 Vulnerabilities to 1 Critical Priority

The Problem Every Security Team Faces

Your vulnerability scanner just finished analyzing a production container image. The results? 145 security findings. Your security team now faces a familiar dilemma: Where do you start?

Traditional vulnerability scanners tell you what’s broken. They don’t tell you what matters.

This is the story of how intelligent vulnerability prioritization transformed 145 findings into one clear, actionable priority—and potentially prevented a massive security incident.

The Real-World Scenario: nginx:stable-bookworm-perl

When we scanned the nginx:stable-bookworm-perl container image with Trivy, the results were typical of modern containerized applications:

  • 145 total security findings
  • 13 HIGH severity vulnerabilities
  • 2 CRITICAL severity vulnerabilities
  • 1 P0 priority finding

Here’s where it gets interesting. Among those 145 findings was CVE-2023-44487—classified by traditional scanners as merely “LOW” severity. Yet this vulnerability was assigned P0 priority by ScanDog’s intelligent prioritization system.

Why the dramatic difference?

Understanding CVE-2023-44487: The HTTP/2 Rapid Reset Attack

CVE-2023-44487 represents a fundamental flaw in HTTP/2 protocol implementations that allows attackers to execute devastating Distributed Denial of Service (DDoS) attacks with minimal resources.

The Technical Reality

CWE-400: Uncontrolled Resource Consumption

The vulnerability exploits HTTP/2’s stream multiplexing feature. Attackers can:

  • Open multiple HTTP/2 streams rapidly
  • Immediately cancel them with RST_STREAM frames
  • Overwhelm server resources with minimal bandwidth
  • Bypass traditional rate-limiting and DDoS protections

Why Traditional Severity Scores Miss the Mark

CVSS Score: 7.5 (High, but not critical)

The CVSS score focuses on technical characteristics:

  • Network attack vector
  • Low attack complexity
  • No privileges required
  • High availability impact

But CVSS doesn’t account for:

  • Active exploitation in the wild
  • Real-world attack campaigns
  • Business impact potential
  • Exploit availability and ease of use

The Numbers That Matter: EPSS Score

This is where ScanDog’s approach fundamentally differs. While scanning tools report severity, ScanDog analyzes probability.

CVE-2023-44487 EPSS Metrics:

Exploit Probability Score: 94.42% The likelihood this vulnerability will be exploited within the next 30 days.

Percentile: 99.98 This vulnerability is more likely to be exploited than 99.98% of all known CVEs.

Translation: Nearly certain exploitation within one month.

Why This Vulnerability Achieved P0 Status

  1. Exploit Available: Public exploit code exists and is actively being used
  2. Active Exploitation: Major cloud providers and CDNs reported attacks
  3. Widespread Impact: Affected Google, Amazon, Cloudflare, and countless others
  4. Low Barrier to Entry: Script kiddies can execute these attacks
  5. Business Critical: Can take down entire services

The Cost of Misplaced Priorities

Imagine your security team following traditional severity-based prioritization:

Day 1-7: Focus on those 2 CRITICAL findings (important, but not currently exploited)

Day 8-14: Address the 13 HIGH severity vulnerabilities

Day 15-30: Maybe get to CVE-2023-44487, the “LOW” severity finding

Day 25: Your production environment is hit by an HTTP/2 rapid reset attack. Service unavailable. Revenue lost. Customer trust damaged.

This isn’t hypothetical. CVE-2023-44487 was actively exploited to launch the largest DDoS attacks ever recorded, with attack volumes reaching 398 million requests per second.

The ScanDog Difference: Context-Aware Prioritization

ScanDog doesn’t just scan for vulnerabilities—it provides the context your team needs to make intelligent decisions.

How ScanDog Transforms Your Workflow

Traditional Approach:

Scanner → 145 Findings → Manual Triage → Guesswork → Delayed Response

ScanDog Approach:

Scanner → 145 Findings → Intelligent Prioritization → 1 P0 Finding → Immediate Action

The Four Pillars of ScanDog’s Prioritization

  1. Exploit Intelligence

    • Real-time monitoring of exploit availability
    • Active exploitation tracking
    • Weaponization status
  2. Threat Context

    • EPSS (Exploit Prediction Scoring System) integration
    • Percentile ranking among all CVEs
    • Probability-based risk assessment
  3. Business Impact

    • Asset criticality consideration
    • Service availability implications
    • Potential blast radius
  4. Environmental Factors

    • Network exposure analysis
    • Authentication requirements
    • Attack complexity in your specific environment

Real-World Impact: By the Numbers

Organizations using intelligent prioritization systems like ScanDog report:

  • 87% reduction in time spent on vulnerability triage
  • 3x faster remediation of critical threats
  • 62% fewer security incidents from known vulnerabilities
  • 95% improvement in mean time to remediate (MTTR) for P0 findings

What This Means for Your Security Program

The Old Way: Volume-Based Security

  • Overwhelmed by finding counts
  • Equal weight to all severities
  • Reactive incident response
  • Constant firefighting mode

The New Way: Intelligence-Based Security

  • Focus on exploitable threats
  • Risk-based prioritization
  • Proactive threat prevention
  • Strategic resource allocation

Taking Action: Lessons from CVE-2023-44487

If you’re still relying solely on vulnerability scanners, here’s what you need to know:

Immediate Steps

  1. Assess Your Current State

    • How many vulnerabilities are in your backlog?
    • Do you know which ones are actively exploited?
    • Can your team distinguish P0 from P4?
  2. Implement Prioritization

    • Integrate EPSS scores into your workflow
    • Consider exploit availability
    • Factor in your specific environment
  3. Automate What Matters

    • Let tools handle the noise
    • Free your team for strategic work
    • Focus human expertise where it counts

Long-Term Strategy

Stop treating all vulnerabilities equally. Not all CVEs deserve the same attention. A LOW severity vulnerability with active exploitation and available exploits demands more urgency than a CRITICAL severity vulnerability with no known exploits and theoretical impact.

Start thinking like an attacker. Threat actors aren’t scanning your CVE list from highest to lowest CVSS score. They’re looking for the easiest path to impact. Your prioritization should reflect their methodology.

Invest in context, not just detection. The gap between knowing you have vulnerabilities and knowing which ones matter is where security programs succeed or fail.

The Bottom Line

In the case study above, traditional vulnerability scanning identified 145 findings. Without intelligent prioritization, CVE-2023-44487 would have been buried among dozens of other issues, potentially ignored until it was too late.

With ScanDog’s context-aware prioritization, that single P0 finding rose to the top immediately—allowing security teams to:

  • Patch before exploitation
  • Prevent service disruption
  • Protect business operations
  • Maintain customer trust

The difference between these two outcomes isn’t about better scanning technology. It’s about better intelligence.

Ready to Move Beyond Traditional Vulnerability Scanning?

ScanDog transforms your vulnerability management from a data problem into an intelligence advantage. See firsthand how intelligent prioritization can help your team focus on what actually matters.

Key Capabilities:

  • Automated EPSS scoring for every finding
  • P0-P4 priority classification based on real-world threat data
  • Integration with existing scanners (Trivy, Grype, and more)
  • Continuous monitoring of exploit availability
  • Custom prioritization rules for your environment

See ScanDog in Action

Schedule a demo to discover how ScanDog can help your team:

  • Reduce vulnerability triage time by 87%
  • Focus on the top 1-2% of findings that actually matter
  • Prevent incidents from known, exploited vulnerabilities
  • Make data-driven security decisions

Don’t let the next CVE-2023-44487 slip through your defenses.

👉 Book a demo


Note: This case study is based on real vulnerability data from production container images. CVE-2023-44487 was disclosed in October 2023 and remains one of the most actively exploited vulnerabilities in modern web infrastructure.

Shrink your AppSec debt by 95% in less than 2h